cpwiki.net http://www.cpwiki.net/index.php/Main_Page MediaWiki 1.21.10 case-sensitive Media Special Talk User User talk Cpwiki.net Cpwiki.net talk File File talk MediaWiki MediaWiki talk Template Template talk Help Help talk Category Category talk 1.0 TLS disablement 0 246 825 2019-04-12T15:17:52Z Nighthawk 1 Created page with "TLS 1.1 and above configure sk102989 + sk120846" wikitext text/x-wiki TLS 1.1 and above configure sk102989 + sk120846 54e9f52343dbb693a2760789bd7391633a8d5029 12400 quick start guide 0 163 454 447 2014-05-12T06:34:06Z Nighthawk 1 /* connecting to the appliance for the first time */ wikitext text/x-wiki == connecting to the appliance for the first time == Gaia and SecurePlatform * The management interface is marked MGMT with a default IP address of 192.168.1.1 * default username and password: admin /admin * mgmt ip accessible via https and a web browser * check point instructions are to run the First Time Configuration Wizard by connecting with a browser * after the wizard run, it is available via CLI through the console or ssh. If you try to access it before running the Wizard, you get this error message This system is for authorized use only. login: admin Password: '''In order to configure your system, please access the Web UI and finish the First Time Wizard.''' lame... == front panel == [[file:12400_front.png]] == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 447 446 2014-05-10T22:29:48Z Nighthawk 1 /* connecting to the appliance for the first time */ wikitext text/x-wiki == connecting to the appliance for the first time == Gaia and SecurePlatform * The management interface is marked MGMT with a default IP address of 192.168.1.1 * default username and password: admin /admin * mgmt ip accessible via https and a web browser * check point instructions are to run the First Time Configuration Wizard by connecting with a browser * after the wizard run, it is available via CLI through the console or ssh according to the documentation. I wonder if it is available before and runs a CLI wizard??? /shrug == front panel == [[file:12400_front.png]] == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 446 445 2014-05-10T22:26:05Z Nighthawk 1 /* connecting to the appliance for the first time */ wikitext text/x-wiki == connecting to the appliance for the first time == Gaia and SecurePlatform * The management interface is marked MGMT with a default IP address of 192.168.1.1 * default username and password: admin /admin * mgmt ip accessible via ssh or https == front panel == [[file:12400_front.png]] == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 445 443 2014-05-10T22:24:52Z Nighthawk 1 wikitext text/x-wiki == connecting to the appliance for the first time == Gaia and SecurePlatform * The management interface is marked MGMT. This interface is preconfigured with the IP address 192.168.1.1. * default username and password: admin /admin * mgmt ip accessible via ssh or https == front panel == [[file:12400_front.png]] == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 443 441 2014-05-10T22:04:15Z Nighthawk 1 wikitext text/x-wiki == front panel == [[file:12400_front.png]] == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 441 440 2014-05-10T22:03:28Z Nighthawk 1 wikitext text/x-wiki == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 440 2014-05-10T21:45:36Z Nighthawk 1 Created page with " == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000..." wikitext text/x-wiki == console == Configure the terminal emulation program settings: * Serial port settings: 9600 BPS, 8 bits, no parity, 1 stop bit. * Flow control is None. [[category:12000 series]] 2 Down CMMs on 61000 chassis 0 131 335 334 2014-02-27T07:03:53Z Nighthawk 1 /* problem resolution */ wikitext text/x-wiki == problem description == '''symptoms''' '''1. "asg stat" shows 2 down CMMs and 0/2 up as seen here''' [Expert@61k_fw-ch01-01]# asg stat -------------------------------------------------------------------------- | System Status | -------------------------------------------------------------------------- | Up time | 1 year, 38 days, 23:14:58 hours | -------------------------------------------------------------------------- | Current CPUs load average | 1 % | | Concurrent connections | 5176 | | Health | '''CMMs 2 Down''' | -------------------------------------------------------------------------- | Chassis 1 | STANDBY UP / Required | | | SGMs 12 / 12 | | | Ports 2 / 2 | | | Fans 6 / 6 | | | SSMs 2 / 2 | | | '''CMMs 0 / 2 (!)''' | | | Power Supplies 5 / 5 | '''2. bay 1(bottom) CMM has red status light''' The bay1 CMM had a red status light...I am not sure which LED (act, ctr, pwe, mjr, hs, mnr) was red. I failed to gather that info from the onsite person helping me. bay2 LEDs were normal, none red. '''3. inter-chassis network connectivity to CMMs failing''' There were are no console cables plugged into the CMM cards for this device. So, no troubleshooting could be done there. The active CMM was not reachable via the CMM IPs 198.51.100.33 or 192.51.100.233. These are the IPs used on all 61000 devices for intercommunication with the CMMS. packet captures below show the CMM not responding to arp requests. listing of the chassis ports for CMM connectivity... [Expert@61k_fw-ch01-01]# ifconfig -a |grep -A 1 CIN eth1-CIN Link encap:Ethernet HWaddr 00:1C:7F:20:14:7C inet addr:198.51.100.1 Bcast:198.51.100.127 Mask:255.255.255.128 eth2-CIN Link encap:Ethernet HWaddr 00:1C:7F:20:14:7D inet addr:198.51.100.201 Bcast:198.51.100.255 Mask:255.255.255.128 packet capture taken on CMM networks show arp requests but no replies. Neither CMM appears to be responding on their network connection. [Expert@61k_fw-ch01-01]# tcpdump -i eth2-CIN tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth2-CIN, link-type EN10MB (Ethernet), capture size 96 bytes 05:37:25.865315 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:26.864981 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:27.864873 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:29.467760 arp who-has 198.51.100.233 tell 198.51.100.204 ... <br>[Expert@61k_fw-ch01-01]# tcpdump -i eth1-CIN tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1-CIN, link-type EN10MB (Ethernet), capture size 96 bytes 05:38:01.206437 arp who-has 198.51.100.33 tell 198.51.100.1 05:38:02.206092 arp who-has 198.51.100.33 tell 198.51.100.1 05:38:04.143829 arp who-has 198.51.100.33 tell 198.51.100.1 == problem resolution == Due to the lack of CMM console cables and telnet/ssh connectivity, we resorted to physically resetting the cards one at a time. They were physically reset by pulling them out and then re-inserting them. First bay 1, then bay 2. After resetting bay 1, there was no change in status. After resetting bay2, then the red error status light on bay1 went green. Also the CMM status changed from 0/2 up to 2/2 up as seen below. [Expert@61k_fw-ch01-01]# asg stat | grep -i -E "chassis|cmms" | Chassis 1 | STANDBY UP / Required | | | CMMs 2 / 2 | == root cause == root cause undetermined [[category:61000]] 334 2014-02-27T07:02:30Z Nighthawk 1 Created page with " == problem description == '''symptoms''' '''1. "asg stat" shows 2 down CMMs and 0/2 up as seen here''' [Expert@61k_fw-ch01-01]# asg stat ---------------------------------..." wikitext text/x-wiki == problem description == '''symptoms''' '''1. "asg stat" shows 2 down CMMs and 0/2 up as seen here''' [Expert@61k_fw-ch01-01]# asg stat -------------------------------------------------------------------------- | System Status | -------------------------------------------------------------------------- | Up time | 1 year, 38 days, 23:14:58 hours | -------------------------------------------------------------------------- | Current CPUs load average | 1 % | | Concurrent connections | 5176 | | Health | '''CMMs 2 Down''' | -------------------------------------------------------------------------- | Chassis 1 | STANDBY UP / Required | | | SGMs 12 / 12 | | | Ports 2 / 2 | | | Fans 6 / 6 | | | SSMs 2 / 2 | | | '''CMMs 0 / 2 (!)''' | | | Power Supplies 5 / 5 | '''2. bay 1(bottom) CMM has red status light''' The bay1 CMM had a red status light...I am not sure which LED (act, ctr, pwe, mjr, hs, mnr) was red. I failed to gather that info from the onsite person helping me. bay2 LEDs were normal, none red. '''3. inter-chassis network connectivity to CMMs failing''' There were are no console cables plugged into the CMM cards for this device. So, no troubleshooting could be done there. The active CMM was not reachable via the CMM IPs 198.51.100.33 or 192.51.100.233. These are the IPs used on all 61000 devices for intercommunication with the CMMS. packet captures below show the CMM not responding to arp requests. listing of the chassis ports for CMM connectivity... [Expert@61k_fw-ch01-01]# ifconfig -a |grep -A 1 CIN eth1-CIN Link encap:Ethernet HWaddr 00:1C:7F:20:14:7C inet addr:198.51.100.1 Bcast:198.51.100.127 Mask:255.255.255.128 eth2-CIN Link encap:Ethernet HWaddr 00:1C:7F:20:14:7D inet addr:198.51.100.201 Bcast:198.51.100.255 Mask:255.255.255.128 packet capture taken on CMM networks show arp requests but no replies. Neither CMM appears to be responding on their network connection. [Expert@61k_fw-ch01-01]# tcpdump -i eth2-CIN tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth2-CIN, link-type EN10MB (Ethernet), capture size 96 bytes 05:37:25.865315 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:26.864981 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:27.864873 arp who-has 198.51.100.233 tell 198.51.100.204 05:37:29.467760 arp who-has 198.51.100.233 tell 198.51.100.204 ... <br>[Expert@61k_fw-ch01-01]# tcpdump -i eth1-CIN tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1-CIN, link-type EN10MB (Ethernet), capture size 96 bytes 05:38:01.206437 arp who-has 198.51.100.33 tell 198.51.100.1 05:38:02.206092 arp who-has 198.51.100.33 tell 198.51.100.1 05:38:04.143829 arp who-has 198.51.100.33 tell 198.51.100.1 == problem resolution == Due to the lack of CMM console cables and telnet/ssh connectivity, we resorted to physically resetting the cards one at a time. . First bay 1, then bay 2. After resetting bay 1, there was no change in status. After resetting bay2, then the red error status light on bay1 went green. Also the CMM status changed from 0/2 up to 2/2 up as seen below. [Expert@61k_fw-ch01-01]# asg stat | grep -i -E "chassis|cmms" | Chassis 1 | STANDBY UP / Required | | | CMMs 2 / 2 | == root cause == root cause undetermined [[category:61000]] 61000 Chassis Management Module (CMM) - diagram and LED descriptions 0 137 355 2014-03-08T05:29:54Z Nighthawk 1 Created page with "[[file:61000_cmm_diagram-desc.png]] [[category:61000]]" wikitext text/x-wiki [[file:61000_cmm_diagram-desc.png]] [[category:61000]] 61000 O.S. global commands 0 174 493 491 2014-06-06T20:52:38Z Nighthawk 1 wikitext text/x-wiki == OS global commands == Description: The global commands are utilities to run certain commands on multiple SGMs. This document is dealing with Operating System related commands, those utilities are mostly an extended wrapper to known UNIX commands (like ls, cp, tcpdump...). They are available in glish and bash as follows... [[file:61k_global_cmds.png]] [[category:61000]] 491 2014-06-06T20:51:20Z Nighthawk 1 Created page with " == OS global commands == Description: The global commands are utilities to run certain commands on multiple SGMs. This document is dealing with Operating System related com..." wikitext text/x-wiki == OS global commands == Description: The global commands are utilities to run certain commands on multiple SGMs. This document is dealing with Operating System related commands, those utilities are mostly an extended wrapper to known UNIX commands (like ls, cp, tcpdump...). [[category:61000]] 61000 Security System Front Panel Modules - diagram and descriptions 0 134 353 351 2014-03-08T05:23:59Z Nighthawk 1 wikitext text/x-wiki [[file:61000_front_panel.png]] [[file:61000_front_panel_description.png]] [[category:61000]] 351 350 2014-03-08T05:18:59Z Nighthawk 1 wikitext text/x-wiki [[file:61000_front_panel.png]] [[category:61000]] 350 2014-03-08T05:18:45Z Nighthawk 1 Created page with "[file:61000_front_panel.png] [[category:61000]]" wikitext text/x-wiki [file:61000_front_panel.png] [[category:61000]] 61000 get cmm firmware version 0 143 384 2014-03-25T15:24:30Z Nighthawk 1 Created page with " [Expert@my61k]# '''asg_version''' +--------------------------------------------------------------------------+ | Hardware Versions ..." wikitext text/x-wiki [Expert@my61k]# '''asg_version''' +--------------------------------------------------------------------------+ | Hardware Versions | +--------------------------------------------------------------------------+ | Component | Configuration | Firmware | +--------------------------------------------------------------------------+ | Chassis 1 | +--------------------------------------------------------------------------+ | SSM1 | dflt_startup.cfg | 7.5.20 | | SSM2 | dflt_startup.cfg | 7.5.20 | | '''CMM | N/A | 2.83''' | +--------------------------------------------------------------------------+ | Chassis 2 | +--------------------------------------------------------------------------+ | SSM1 | dflt_startup.cfg | 7.5.20 | | SSM2 | dflt_startup.cfg | 7.5.20 | | '''CMM | N/A | 2.70''' | +--------------------------------------------------------------------------+ ... [[category:61k]] 61k CMM 0 129 549 548 2015-01-14T16:20:37Z Nighthawk 1 wikitext text/x-wiki '''Chassis Management Module CLI''' The Chassis Management Module (CMM) monitors and controls hardware modules in the chassis. Communication with a CMM occurs via SNMP requests from the SMO SGM. If a hardware sensor reports a problem the CMM automatically takes action or sends a report. CMMs also have a command line interface. [[There are two ways to connect a CMM CLI:]] 1) Connect to the serial port on the front panel of the CMM * In your terminal emulation program, set the baud rate to 9600 * Enter admin for the user name and password OR 2) Open a telnet or SSH session from one of the SGMs * First make sure that you have connectivity to the CMMs by pinging both addresses: 198.51.100.33 (routed via SSM1) 198.51.100.233 (routed from SSM2) * Telnet or ssh from the SGM to the CMM * Enter admin for the user name and password note - the information above is base on default configurations [[category:61k]] 548 322 2015-01-14T16:20:30Z Nighthawk 1 wikitext text/x-wiki '''Chassis Management Module CLI''' The Chassis Management Module (CMM) monitors and controls hardware modules in the chassis. Communication with a CMM occurs via SNMP requests from the SMO SGM. If a hardware sensor reports a problem the CMM automatically takes action or sends a report. CMMs also have a command line interface. [[There are two ways to connect a CMM CLI:]] 1) Connect to the serial port on the front panel of the CMM * In your terminal emulation program, set the baud rate to 9600 * Enter admin for the user name and password OR 2) Open a telnet or SSH session from one of the SGMs * First make sure that you have connectivity to the CMMs by pinging both addresses: 198.51.100.33 (routed via SSM1) 198.51.100.233 (routed from SSM2) * Telnet or ssh from the SGM to the CMM * Enter admin for the user name and password note - the information above is base on default configurations [[category:61k]] 322 321 2013-12-11T06:24:02Z Nighthawk 1 wikitext text/x-wiki '''Chassis Management Module CLI''' The Chassis Management Module (CMM) monitors and controls hardware modules in the chassis. Communication with a CMM occurs via SNMP requests from the SMO SGM. If a hardware sensor reports a problem the CMM automatically takes action or sends a report. CMMs also have a command line interface. [[There are two ways to connect a CMM CLI:]] 1) Connect to the serial port on the front panel of the CMM * In your terminal emulation program, set the baud rate to 9600 * Enter admin for the user name and password OR 2) Open a telnet or SSH session from one of the SGMs * First make sure that you have connectivity to the CMMs by pinging both addresses: 198.51.100.33 (routed via SSM1) 198.51.100.233 (routed from SSM2) * Telnet or ssh from the SGM to the CMM * Enter admin for the user name and password [[category:61k]] 321 2013-12-11T06:18:52Z Nighthawk 1 Created page with "Chassis Management Module CLI The Chassis Management Module (CMM) monitors and controls hardware modules in the chassis. Communication with a CMM occurs via SNMP requests from..." wikitext text/x-wiki Chassis Management Module CLI The Chassis Management Module (CMM) monitors and controls hardware modules in the chassis. Communication with a CMM occurs via SNMP requests from the SMO SGM. If a hardware sensor reports a problem the CMM automatically takes action or sends a report. CMMs also have a command line interface. There are two ways to connect a CMM CLI:  Connect to the serial port on the front panel of the CMM o In your terminal emulation program, set the baud rate to 9600 o Enter admin for the user name and password  Open a telnet or SSH session from one of the SGMs o First make sure that you have connectivity to the CMMs by pinging both addresses:  198.51.100.33 (routed via SSM1)  198.51.100.233 (routed from SSM2) o Telnet or ssh from the SGM to the CMM o Enter admin for the user name and password Adding drives to nokia firewall 0 6 7 2013-02-25T22:09:19Z Nighthawk 1 Created page with "Below is a console/terminal log of a new hard drive being installed, replacing a failed drive, and being added back to the raid mirror. BOOTMGR[4]> sysinfo CPU 0: 2660 MHz..." wikitext text/x-wiki Below is a console/terminal log of a new hard drive being installed, replacing a failed drive, and being added back to the raid mirror. BOOTMGR[4]> sysinfo CPU 0: 2660 MHz Intel(R) Xeon(R) CPU E5430 @ 2.66GHz Memory: 2663497728 (2048M bytes) Disk Devices: IO port 0x1f0 adc0: unit 0 (ad0): <STEC M2+ CF 9.0.2> 128MB (250880 sectors), 980 cyls, 8 heads, 32 S/T SCSI-DISK-A (da0): <ATA FUJITSU MHY2080B 010C> 80026MB (156301488 sectors), 9729 cyls, 255 heads, 63 S/T, 512 B/S SCSI-DISK-B (da1): <ATA FUJITSU MHY2080B 010C> 80026MB (156301488 sectors), 9729 cyls, 255 heads, 63 S/T, 512 B/S Network Interfaces: eth-s4p1: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f4 half duplex eth-s4p2: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f5 half duplex eth-s4p3: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f6 half duplex eth-s4p4: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f7 half duplex loop0: flags=10b<UP,LINK,LOOPBACK,PRESENT> tun0: flags=107<UP,LINK,POINTOPOINT,PRESENT> BOOTMGR[5]> raid ======================================================== IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 ======================================================== Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 ======================================================== 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT ======================================================== Choose an option: 1 =================== RAID MENU ========================== 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu ======================================================== Choose an option: 30 B___T___L Type Serial Product Rev Blocks Disk MB 1. 0 0 0 Disk K449T8825xxx FUJITSU MHY2080B 010C 156301488 76319 2. 0 1 0 Disk K449T8625yyy FUJITSU MHY2080B 010C 156301488 76319 To create a volume, select two or more of the available targets The first selection will be Migrated as MASTER, keeping the data Select the primary drive : [1-2 or RETURN to quit] 1 Select a secondary drive : [1-2 or RETURN to quit] 2 2 physical disks were created Setting volume type: [0=Mirroring] Setting volume size: 76158 MB Enabled write caching by default. Volume was created Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done =================== RAID MENU ========================== 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu ======================================================== Choose an option: 1 ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) =================== RAID MENU ========================== 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu ======================================================== Choose an option: q ======================================================== 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT ======================================================== Choose an option: q Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. BOOTMGR[13]> sysinfo CPU 0: 2660 MHz Intel(R) Xeon(R) CPU E5430 @ 2.66GHz Memory: 2663497728 (2048M bytes) Disk Devices: IO port 0x1f0 adc0: unit 0 (ad0): <STEC M2+ CF 9.0.2> 128MB (250880 sectors), 980 cyls, 8 heads, 32 S/T DISK-A-B Volume (da0): <LSILOGIC Logical Volume 3000> 79857MB (155971584 sectors), 9708 cyls, 255 heads, 63 S/T, 512 B/S Network Interfaces: eth-s4p1: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f4 half duplex eth-s4p2: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f5 half duplex eth-s4p3: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f6 half duplex eth-s4p4: flags=130<BROADCAST,MULTICAST,PRESENT> ether 00:a0:8e:c0:c2:f7 half duplex loop0: flags=10b<UP,LINK,LOOPBACK,PRESENT> tun0: flags=107<UP,LINK,POINTOPOINT,PRESENT> [[category:nokia]] Assign cma list to variable 0 5 6 2013-02-25T22:04:56Z Nighthawk 1 Created page with "Assign cma list to an array variable for use in a script check point command: mdsstat | grep CMA | sed -e 's/|//g' | awk '{printf $2 " " }' bash example: assign to variabl..." wikitext text/x-wiki Assign cma list to an array variable for use in a script check point command: mdsstat | grep CMA | sed -e 's/|//g' | awk '{printf $2 " " }' bash example: assign to variable CMA_LIST=$(mdsstat | grep CMA | sed -e 's/|//g' | awk '{printf $2 " " }') access the first variable via index 0 ${CMA_CMA[0]} [[category:scripting]] CLI upgrade guide for R75.40 SPLAT to R75.40 Gaia 0 116 455 453 2014-05-12T18:31:36Z Nighthawk 1 wikitext text/x-wiki why would you bother to upgrade just the O.S. and not the CP version? In this case, the goal was to get to Gaia to use VRRP instead of CPHA and we didn't feel like upgrading the SmartCenter which as R75.40. using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media used here... # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/cdrom''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 453 452 2014-05-11T04:02:19Z Nighthawk 1 wikitext text/x-wiki why would you bother to upgrade just the O.S. and not the CP version? In this case, the goal was to get to Gaia to use VRRP instead of CPHA and we didn't feel like upgrading the SmartCenter which as R75.40. using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media used here... # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 452 246 2014-05-11T04:00:38Z Nighthawk 1 moved [[upgrading R75.40 SPLAT to R75.40 Gaia]] to [[CLI upgrade guide for R75.40 SPLAT to R75.40 Gaia]] wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media used here... # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 246 245 2013-09-15T03:47:09Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media used here... # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 245 244 2013-09-14T15:20:39Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media used here... # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 244 242 2013-09-14T15:20:25Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall There are multiple ISO images from Check Point with the same name as above. md5 for media # md5sum Check_Point_R75.40_Gaia.iso '''e5074b92c37a165ef940cb34c1725511''' 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 242 241 2013-09-13T21:58:35Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 15. validate traffic flows through the firewalls 241 240 2013-09-13T21:57:55Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha. CPHA will still function since we haven't changed softare versions. 9. Test traffic flows. 10. repeat steps 1-7 on the other offline firewall. 11. setup vrrp on both firewalls. some downtime with result. http://www.cpwiki.net/index.php/gaia_vrrp_setup_using_CLI 12. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 13. re-install policy 14. check proxy arps on both firewalls # fw ctl arp 240 222 2013-09-13T21:51:50Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 5. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 6. Reboot 7. Install policy 8. Failover cpha 9. Edit local.arp. Replace the old unicast MAC addresses used by CPHA with the VMAC address associated with the VRRP backup-addresses. 222 221 2013-09-13T07:07:09Z Nighthawk 1 wikitext text/x-wiki using the CLI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# '''mount /mnt/cdrom''' or [Expert@chkpfw2]# '''mkdir /mnt/iso''' [Expert@chkpfw2]# '''mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso''' 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# '''rpm -e CPppak-R75.40-00''' 4. Start upgrade [Expert@chkpfw2]# '''patch add cd''' 5. Reboot 6. Install policy 7. Failover cpha 221 216 2013-09-13T07:05:33Z Nighthawk 1 wikitext text/x-wiki using the WebUI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# mount /mnt/cdrom or [Expert@chkpfw2]# mkdir /mnt/iso [Expert@chkpfw2]# mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso 3. verify backup status cphaprob stat 4. uninstall something... The upgrade wrapper script will force us to chose a new product to install, so uninstall something simple. I chose Performance Pack. [Expert@chkpfw2]# rpm -e CPppak-R75.40-00 4. Start upgrade [Expert@chkpfw2]# patch add cd 5. Reboot 6. Install policy 7. Failover cpha 216 215 2013-09-13T06:38:48Z Nighthawk 1 wikitext text/x-wiki using the WebUI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# mount /mnt/cdrom or [Expert@chkpfw2]# mkdir /mnt/iso [Expert@chkpfw2]# mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso 3. verify backup status cphaprob stat 4. Start upgrade [Expert@chkpfw2]# patch add cd 5. Reboot 6. Install policy 7. Failover cpha 215 214 2013-09-13T03:27:49Z Nighthawk 1 wikitext text/x-wiki using the WebUI... 1. upload the Check_Point_R75.40_Gaia.iso file or insert media into the firewall 2. mount the media [Expert@chkpfw2]# mount /mnt/cdrom or [Expert@chkpfw2]# mkdir /mnt/iso [Expert@chkpfw2]# mount -o loop /var/tmp/Check_Point_R75.40_Gaia.iso /mnt/iso 3. verify backup status cphaprob stat 4. Start upgrade [Expert@chkpfw2]# patch add cd 214 2013-09-12T21:06:44Z Nighthawk 1 Created page with "using the WebUI... 1. Download upgrade file Check_Point_Upgrade_for_R75.40.Splat_to_Gaia.tgz from check point website md5sum 3cfe6ba51cf3cc19bacecaad2bad555e 2. Connect a ..." wikitext text/x-wiki using the WebUI... 1. Download upgrade file Check_Point_Upgrade_for_R75.40.Splat_to_Gaia.tgz from check point website md5sum 3cfe6ba51cf3cc19bacecaad2bad555e 2. Connect a browser to the Check Point WebUI interface on port 443. Device > Upgrade > 2. Select the upgrade package file CLM object settings 0 204 615 614 2017-04-16T19:02:39Z Nighthawk 1 wikitext text/x-wiki CLM objects_5_0.C settings for some log stuff ==logs > storage== <br>:log_delete_below_metrics (percent) <br>:log_delete_below_value (5) <br> :log_delete_on_below (true) <br> :log_delete_on_run_script (false) <br> :log_delete_script_command () <br> :log_keep_days_value (30) <br> :log_keep_on_days (true) ===index files (smartlog)=== <br> :index_delete_above_size (false) <br> :index_delete_above_size_metrics (percent) <br> :index_delete_above_size_value (30) <br> :index_delete_older_than (true) <br> :index_delete_older_than_value (14) ==smartlog enabled== :log_indexer (true) 50f756471bea49537584aca36e2e666943cacbd0 614 2017-04-16T19:00:10Z Nighthawk 1 Created page with "CLM objects_5_0.C settings for some log stuff ==logs > storage== <br>:log_delete_below_metrics (percent) <br>:log_delete_below_value (5) <br> :log_delete_on_..." wikitext text/x-wiki CLM objects_5_0.C settings for some log stuff ==logs > storage== <br>:log_delete_below_metrics (percent) <br>:log_delete_below_value (5) <br> :log_delete_on_below (true) <br> :log_delete_on_run_script (false) <br> :log_delete_script_command () <br> :log_keep_days_value (30) <br> :log_keep_on_days (true) ===index files (smartlog)== <br> :index_delete_above_size (false) <br> :index_delete_above_size_metrics (percent) <br> :index_delete_above_size_value (30) <br> :index_delete_older_than (true) <br> :index_delete_older_than_value (14) ==smartlog enabled== :log_indexer (true) 633a88ee15d3fb6f003a49abc18f167affab6470 CMA login failure regarding permissions 0 111 203 202 2013-08-07T07:49:53Z Nighthawk 1 wikitext text/x-wiki == symptoms== '''SmartDashboard Error Message:''' "Read/Write permission are required in order to connect in this mode" '''Domain Manager / MDG:''' hangs at "Loading Administrators..." '''fwm debug message:''' [FWM 10581 1962781312]@mds1[7 Aug  7:29:06] Failed to initialize administrators profiles == Solution == '''sk71921''' # mdsstop -m # cp $MDSDIR/mdsdb/admin_permissions_profiles.C $MDSDIR/mdsdb/admin_permissions_profiles.C.backup2 # cp $MDSDIR/mdsdb/admin_permissions_profiles.C.backup $MDSDIR/mdsdb/admin_permissions_profiles.C # mdsstart -m logins via MDG and SmartDashboard function again. [[category:provider-1]] 202 201 2013-08-07T07:49:39Z Nighthawk 1 wikitext text/x-wiki == symptoms== '''SmartDashboard Error Message:''' "Read/Write permission are required in order to connect in this mode" '''Domain Manager / MDG:''' hangs at "Loading Administrators..." '''fwm debug message:''' [FWM 10581 1962781312]@mds1[7 Aug  7:29:06] Failed to initialize administrators profiles == Solution == '''sk71921''' # mdsstop -m # cp $MDSDIR/mdsdb/admin_permissions_profiles.C $MDSDIR/mdsdb/admin_permissions_profiles.C.backup2 # cp $MDSDIR/mdsdb/admin_permissions_profiles.C.backup $MDSDIR/mdsdb/admin_permissions_profiles.C # mdsstart -m logins via MDG and SmartDashboard function again. [[category:provider-1]] 201 2013-08-07T07:48:43Z Nighthawk 1 Created page with " == symptoms== '''SmartDashboard Error Message''' "Read/Write permission are required in order to connect in this mode" '''Domain Manager / MDG''' hangs at "Loading Adminis..." wikitext text/x-wiki == symptoms== '''SmartDashboard Error Message''' "Read/Write permission are required in order to connect in this mode" '''Domain Manager / MDG''' hangs at "Loading Administrators..." fwm debug message [FWM 10581 1962781312]@mds1[7 Aug  7:29:06] Failed to initialize administrators profiles == Solution == '''sk71921''' # mdsstop -m # cp $MDSDIR/mdsdb/admin_permissions_profiles.C $MDSDIR/mdsdb/admin_permissions_profiles.C.backup2 # cp $MDSDIR/mdsdb/admin_permissions_profiles.C.backup $MDSDIR/mdsdb/admin_permissions_profiles.C # mdsstart -m logins via MDG and SmartDashboard function again. [[category:provider-1]] CMA status is "Stopped" in MDG 0 12 13 2013-02-25T22:39:33Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Solution ID: sk35378 Product: Multi-Domain Management / Provider-1 Version: NGX R65, R70 Last Modified: 07-Jul-2008 Symptoms CMA status in MDG is "Stopped". User cannot connect to the CMA from the MDG. No problem connecting to the CMA directly via SmartDashboard. Cause applications.C* and CPMILinks* files have been corrupted. Solution To resolve this issue, remove the applications.C* and CPMILinksMgr.* files from the CMA. Proceed as follows: Change the environment to the relevant CMA and check the environment location: # mdsenv CMA_name # echo $FWDIR Note: The user can also use the command # mdsenv IP Stop the relevant CMA and check its status: # mdsstop_customer CMA_name # mdsstat Note: The user can also use the command # mdsstop_customer IP Redirect to the conf directory of the relevant CMA and remove applications.C* and CPMILinksMgr.* files : # mcd conf # mkdir backup # mv $FWDIR/conf/applications.C* $FWDIR/conf/backup/ # mv $FWDIR/conf/CPMILinksMgr.* $FWDIR/conf/backup/ Restart the CMA: # mdsstart_customer CMA_name Note: The user can also use the command # mdsstart_customer IP Check the MDG status for the relevant CMA. Wait for 1-2 minutes till the status is updated, and test the SmartDashboard launch from the MDG. Notes: applications.C and CPMILinksMgr.db will be created again (in $FWDIR/conf/) at CMA restart. Do not delete these files from the MDS itself. These files are not recreated at the MDS level (only on the CMA). The backup directory can be removed after the solution is verified. [[category:check point]] CMD (Chassis Monitor Daesmon) restart 0 168 477 465 2014-05-23T03:58:47Z Nighthawk 1 wikitext text/x-wiki == indentify SGM blade running the CMD == run "asg stat -i tasks" and note the SGM ID for the CH Monitor example: [Expert@my61k-ch01-01]# '''asg stat -i tasks''' <br>Chassis ID: 1 ------------- Task (Task ID) SGM ID <br>UIPC (5) 1(local) General (1) 2 LACP (2) 3 CH Monitor (3) 4 <br>Chassis ID: 2 ------------- Task (Task ID) SGM ID <br>SMO (0) 1 UIPC (5) 1 General (1) 2 LACP (2) 3 CH Monitor (3) 4 DR Manager (4) 5 change to the appropriate blade [Expert@my61k-ch01-01]# '''blade 1_4''' Moving to blade 1_4 This system is for authorized use only. Last login: Sat Apr 12 04:54:15 2014 from 192.0.2.1 restart cmd [Expert@my61k-ch01-04]# '''tellpm process:cmd''' [Expert@my61k-ch01-04]# '''tellpm process:cmd t''' checking the cmd process status / id [Expert@my61k-ch01-04]# '''ps -ef | grep cmd$''' nobody 19781 4339 0 03:45 ? 00:00:00 /opt/CPsuite-R75/fw1/bin/cmd [[category:61000]] 465 464 2014-05-19T18:47:45Z Nighthawk 1 /* indentify SGM blade running the CMD */ wikitext text/x-wiki == indentify SGM blade running the CMD == run "asg stat -i tasks" and note the SGM ID for the CH Monitor example: [Expert@my61k-ch01-01]# '''asg stat -i tasks''' <br>Chassis ID: 1 ------------- Task (Task ID) SGM ID <br>UIPC (5) 1(local) General (1) 2 LACP (2) 3 CH Monitor (3) 4 <br>Chassis ID: 2 ------------- Task (Task ID) SGM ID <br>SMO (0) 1 UIPC (5) 1 General (1) 2 LACP (2) 3 CH Monitor (3) 4 DR Manager (4) 5 change to the appropriate blade [Expert@my61k-ch01-01]# '''blade 1_4''' Moving to blade 1_4 This system is for authorized use only. Last login: Sat Apr 12 04:54:15 2014 from 192.0.2.1 restart cmd [Expert@my61k-ch01-04]# '''tellpm process:cmd''' [Expert@my61k-ch01-04]# '''tellpm process:cmd t''' [[category:61000]] 464 463 2014-05-19T18:47:06Z Nighthawk 1 wikitext text/x-wiki == indentify SGM blade running the CMD == run the following command and note the SGM ID for the CH Monitor [Expert@my61k-ch01-01]# '''asg stat -i tasks''' <br>Chassis ID: 1 ------------- Task (Task ID) SGM ID <br>UIPC (5) 1(local) General (1) 2 LACP (2) 3 CH Monitor (3) 4 <br>Chassis ID: 2 ------------- Task (Task ID) SGM ID <br>SMO (0) 1 UIPC (5) 1 General (1) 2 LACP (2) 3 CH Monitor (3) 4 DR Manager (4) 5 change to the appropriate blade [Expert@my61k-ch01-01]# '''blade 1_4''' Moving to blade 1_4 This system is for authorized use only. Last login: Sat Apr 12 04:54:15 2014 from 192.0.2.1 restart cmd [Expert@my61k-ch01-04]# '''tellpm process:cmd''' [Expert@my61k-ch01-04]# '''tellpm process:cmd t''' [[category:61000]] 463 2014-05-19T18:45:18Z Nighthawk 1 Created page with " == indentify SGM blade running the CMD == run the following command and note the SGM ID for the CH Monitor [Expert@my61k-ch01-01]# '''asg stat -i tasks''' <br>Chassis ID:..." wikitext text/x-wiki == indentify SGM blade running the CMD == run the following command and note the SGM ID for the CH Monitor [Expert@my61k-ch01-01]# '''asg stat -i tasks''' <br>Chassis ID: 1 ------------- Task (Task ID) SGM ID <br>UIPC (5) 1(local) General (1) 2 LACP (2) 3 CH Monitor (3) 4 <br>Chassis ID: 2 ------------- Task (Task ID) SGM ID <br>SMO (0) 1 UIPC (5) 1 General (1) 2 LACP (2) 3 CH Monitor (3) 4 DR Manager (4) 5 change to the appropriate blade [Expert@my61k-ch01-01]# blade 1_4 Moving to blade 1_4 This system is for authorized use only. Last login: Sat Apr 12 04:54:15 2014 from 192.0.2.1 restart cmd [Expert@my61k-ch01-04]# '''tellpm process:cmd''' [Expert@my61k-ch01-04]# '''tellpm process:cmd t''' [[category:61000]] CMM Shelf Manager CLI Command Summary 0 149 418 2014-04-15T15:58:19Z Nighthawk 1 Created page with "<TABLE CLASS="Titled" SUMMARY="Table that is numbered and titled" BORDER="1" CELLPADDING="5" CELLSPACING="0" DIR="LTR"><CAPTION CLASS="TableCaptionA-Wide"> Shelf Manager CLI ..." wikitext text/x-wiki <TABLE CLASS="Titled" SUMMARY="Table that is numbered and titled" BORDER="1" CELLPADDING="5" CELLSPACING="0" DIR="LTR"><CAPTION CLASS="TableCaptionA-Wide"> Shelf Manager CLI Command Summary </CAPTION> <TR> <TH SCOPE="COL" ROWSPAN="1" COLSPAN="1" BGCOLOR="#CCCCCC"> <P CLASS="TableHead">Command </P> </TH> <TH SCOPE="COL" ROWSPAN="1" COLSPAN="1" BGCOLOR="#CCCCCC"> <P CLASS="TableHead">Parameters </P> </TH> <TH SCOPE="COL" ROWSPAN="1" COLSPAN="1" BGCOLOR="#CCCCCC"> <P CLASS="TableHead">Description </P> </TH> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">activate</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Activates the specified FRU. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">alarm</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">alarm type </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Activates or clears Telco alarms. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">board -v</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">slot number (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows information about blade servers. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">boardreset</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">slot number </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Resets the specified ATCA blade server. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">console</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">slot number </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Opens a console session on the node blade server in the specified slot. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">deactivate</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Deactivates the specified FRU. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">exit</KBD>|<KBD CLASS="Command">quit</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Exits from the interpreter in interactive mode. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">fans</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">FRU device ID (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows information about fans. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">fru</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">FRU device ID (optional) </P> <P CLASS="TableText">FRU type (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows information about one or a group of FRUs in the shelf; FRUs are selected by type or by the parent IPM controller. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">frudata</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">FRU device ID (optional) </P> <P CLASS="TableText">block/byte offset (optional) </P> <P CLASS="TableText">data (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Provides raw access to the FRU. Information on the specified FRU. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">frudatar</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> <P CLASS="TableText">File name </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Reads the FRU data area of the specified FRU and stores the data in the specified file. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">frudataw</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> <P CLASS="TableText">File name </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Writes the FRU data in the specified file into the FRU data area of the specified FRU. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">fruinfo -v</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Provides user-friendly FRU Information output. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">getthreshold</KBD> | <KBD CLASS="Command">threshold</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">sensor name (optional) </P> <P CLASS="TableText">sensor number (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows threshold information about a specific sensor. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">help</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the list of supported commands. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">ipmc</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows information about one or all IPM controllers in the shelf. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">minfanlevel</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">fan level (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows or sets the minimum fan level. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">ps -ef |grep hp</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><STRONG></STRONG>&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Checks the <KBD CLASS="Command">openhpi</KBD> status. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">sensor</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">sensor name (optional) </P> <P CLASS="TableText">sensor number (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows information about one or a group of sensors; sensors are selected by IPM controller address, number or name. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">sensordata</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address (optional) </P> <P CLASS="TableText">sensor name (optional) </P> <P CLASS="TableText">sensor number (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows value information for a specific sensor. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">sensorread</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">sensor number </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows raw value information for a specific sensor (ignoring any Sensor Data Record describing the sensor). </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">setfanlevel</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> <P CLASS="TableText">level </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Sets a new level for the fan controlled by the specified FRU. </P> <P CLASS="TableText">Use <KBD CLASS="Command">clia setfanlevel 20 3 5</KBD> to get the fans to slow down. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">setfanpolicy</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">FRU device ID </P> <P CLASS="TableText">action to be taken: <KBD CLASS="Command">ENABLE</KBD> or <KBD CLASS="Command">DISABLE</KBD> </P> <P CLASS="TableText">timeout (optional) </P> <P CLASS="TableText">site type (optional) </P> <P CLASS="TableText">site number (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Enables or disables fan trays for cooling management in addition to the Fan Geography record if this one is presented in the Shelf FRU. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">setthreshold</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">IPMB address </P> <P CLASS="TableText">sensor name </P> <P CLASS="TableText">sensor number </P> <P CLASS="TableText">threshold type </P> <P CLASS="TableText">threshold value </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Changes a specific threshold value (upper/lower, critical/non-critical/non-recoverable) for a specific sensor. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">setuserlabel</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">shelf name </P> <P CLASS="TableText">slot number name </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Configures user assigned names for the shelf and the blade servers. Blade server names are assigned to slot numbers. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">shelf</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">subcommand, with its parameters </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows general information about the shelf; several subcommands allow setting shelf attributes and getting additional information about specific areas. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">shelfaddress</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shelf Address string (optional) </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Gets or sets the Shelf Address field of the Address Table within Shelf FRU Information. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">shelf address_table </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><STRONG></STRONG>&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the address table record in the shelf FRU info with shelf address and list of address table entries. For each entry, shows hardware address, site type, and site number. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">shelf cooling_state </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><STRONG></STRONG>&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the current cooling state of the shelf with normal, minor, major, and critical alert information. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">shelf fans_state </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><STRONG></STRONG>&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the current state of the fan techometers in the shelf with normal, minor, major and critical alert information. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">shmstatus</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the Shelf Manager Active/Backup status. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">showhost</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">slot-number </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Displays version information about the firmware on certain Netra CP3x60 node blade servers. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">showunhealthy</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the unhealthy components of the shelf. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">switchover</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Initiates a switchover to the backup Shelf Manager. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">terminate</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Terminates the Shelf Manager without rebooting the shelf management card. </P> </TD> </TR> <TR> <TD SCOPE="ROW" ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText"><KBD CLASS="Command">version</KBD> </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">&nbsp; </P> </TD> <TD ROWSPAN="1" COLSPAN="1"> <P CLASS="TableText">Shows the Shelf Manager version information. </P> </TD> </TR> </TABLE> Changing the Mgmt HA status of SmartCenter / CMA from command line 0 13 473 472 2014-05-20T15:34:17Z Nighthawk 1 wikitext text/x-wiki Changing the HA status of the Management station from command line (CLI) Solution ID: sk34495 Product: SmartCenter, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75, R77 Date Created: 27-Feb-2008 Last Modified: 13-Dec-2011 == Solution == Run the cpstop command. To find out the current status, run: # cpprod_util FwIsActiveManagement where... 0 - means Standby 1 - means Active To set the Management station to Standby status, run: # cpprod_util FwSetActiveManagement 0 To set the Management station to Active status, run: # cpprod_util FwSetActiveManagement 1 [[category:provider-1]] [[category:smartcenter]] 472 470 2014-05-20T15:33:57Z Nighthawk 1 wikitext text/x-wiki Changing the HA status of the Management station from command line (CLI) Solution ID: sk34495 Product: SmartCenter, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75, R77 Date Created: 27-Feb-2008 Last Modified: 13-Dec-2011 == Solution == Run the cpstop command. To find out the current status, run: # cpprod_util FwIsActiveManagement where... 0 - means Standby 1 - means Active To set the Management station to Standby status, run: # cpprod_util FwSetActiveManagement 0 To set the Management station to Active status, run: # cpprod_util FwSetActiveManagement 1 [[category:check point]] 470 469 2014-05-20T15:33:20Z Nighthawk 1 moved [[Changing the HA status of the Management station from command line]] to [[Changing the Mgmt HA status of SmartCenter / CMA from command line]] wikitext text/x-wiki Changing the HA status of the Management station from command line Solution ID: sk34495 Product: SmartCenter, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75 Date Created: 27-Feb-2008 Last Modified: 13-Dec-2011 == Solution == Run the cpstop command. To find out the current status, run: # cpprod_util FwIsActiveManagement where... 0 - means Standby 1 - means Active To set the Management station to Standby status, run: # cpprod_util FwSetActiveManagement 0 To set the Management station to Active status, run: # cpprod_util FwSetActiveManagement 1 [[category:check point]] 469 14 2014-05-20T15:16:42Z Nighthawk 1 wikitext text/x-wiki Changing the HA status of the Management station from command line Solution ID: sk34495 Product: SmartCenter, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75 Date Created: 27-Feb-2008 Last Modified: 13-Dec-2011 == Solution == Run the cpstop command. To find out the current status, run: # cpprod_util FwIsActiveManagement where... 0 - means Standby 1 - means Active To set the Management station to Standby status, run: # cpprod_util FwSetActiveManagement 0 To set the Management station to Active status, run: # cpprod_util FwSetActiveManagement 1 [[category:check point]] 14 2013-02-25T22:40:12Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Changing the HA status of the Management station from command line Solution ID: sk34495 Product: Security Gateway, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75 Date Created: 27-Feb-2008 Last Modified: 13-Dec-2011 Did this solution solve your problem? [Click on the stars to rate] == Solution == Run the cpstop command. To find out the current status, run: # cpprod_util FwIsActiveManagement where... 0 - means Standby 1 - means Active To set the Management station to Standby status, run: # cpprod_util FwSetActiveManagement 0 To set the Management station to Active status, run: # cpprod_util FwSetActiveManagement 1 [[category:check point]] Check CMA active / standby status from command line / CLI 0 9 10 2013-02-25T22:11:18Z Nighthawk 1 Created page with "cpmistat -o schema -r mg <cma_name> | grep mgActiveStatus [[category:mgmtha]]" wikitext text/x-wiki cpmistat -o schema -r mg <cma_name> | grep mgActiveStatus [[category:mgmtha]] Check Point RMA return status check 0 128 316 2013-11-19T16:54:34Z Nighthawk 1 Created page with " send email to: rma_return@checkpoint.com include: SR # AND Replacement MAC address or serial number or STN [[category:support]]" wikitext text/x-wiki send email to: rma_return@checkpoint.com include: SR # AND Replacement MAC address or serial number or STN [[category:support]] Check Point man pages (R75): fw log 0 63 90 89 2013-05-09T16:15:58Z Nighthawk 1 wikitext text/x-wiki '''fw log''' '''Description''' fw log displays the content of Log files. '''Usage''' fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert_name|all)] [-g] [logfile] '''Syntax''' {| cellspacing="5" border="1" ! align="left" |Argument ! Description |- | -f [-t] |After reaching the end of the currently displayed file, do not exit (the default behavior), but continue to monitor the Log file indefinitely and display it while it is being written. The -t parameter indicates that the display is to begin at the end of the file, in other words, the display will initially be empty and only new records added later will be displayed. -t must come with a -f flag. These flags are relevant only for active files. |- | -n | Do not perform DNS resolution of the IP addresses in the Log file (the default behavior). This option significantly speeds up the processing. |- | -l | Display both the date and the time for each log record (the default is to show the date only once above the relevant records, and then specify the time per log record). |- | -o | Show detailed log chains (all the log segments a log record consists of). |- | -c action | Display only events whose action is action, that is, accept, drop, reject, authorize, deauthorize, encrypt and decrypt. Control actions are always displayed. |- | -h host | Display only log whose origin is the specified IP address or name. |- | -s starttime | Display only events that were logged after the specified time (see format below). starttime may be a date, a time, or both. If date is omitted, then today's date is assumed. |- | -e endtime | Display only events that were logged before the specified time (see format below). endtime may be a date, a time, or both. |- | -b starttime endtime | Display only events that were logged between the specified start and end times (see format below), each of which may be a date, a time, or both. If date is omitted, then today's date is assumed. The start and end times are expected after the flag. |- | -u Unification scheme file name. | unification_scheme_file |- | -m unification_mode | This flag specifies the unification mode.  initial - the default mode, specifying complete unification of log records; that is, output one unified record for each id. This is the default. When used together with -f, no updates will be displayed, but only entries relating to the start of new connections. To display updates, use the semi parameter.  semi - step-by-step unification, that is, for each log record, output a record that unifies this record with all previously-encountered records with the same id.  raw - output all records, with no unification. |- | -a | Output account log records only. |- | -k alert_name |Display only events that match a specific alert type. The default is all, for any alert type. |- | -g | Do not use a delimited style. The default is:  : after field name  ; after field value |- | logfile | se logfile instead of the default Log file. The default Log File is $FWDIR/log/fw.log. |} Where the full date and time format is: MMM DD, YYYY HH:MM:SS. For example: May 26, 1999 14:20:00 It is possible to specify date only in the format MMM DD, YYYY, or time only, in the format: HH:MM:SS, where time only is specified, the current date is assumed. '''Example''' fw log fw log | more fw log -c reject fw log -s "May 26, 1999" fw log -f -s 16:00:00 '''Output''' [<date>] <time> <action> <origin> <interface dir and name> [alert] [field name: field value;] ... Each output line consists of a single log record, whose fields appear in the format shown above. '''Example''' 14:56:39 reject jam.checkpoint.com >daemon alert src: veredr.checkpoint.com; dst: jam.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Access denied - wrong user name or password ; scheme: IKE; reject_category: Authentication error; product: Security Gateway 14:57:49 authcrypt jam.checkpoint.com >daemon src: veredr.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Authenticated by Internal Password; scheme: IKE; methods: AES- 256,IKE,SHA1; product: Security Gateway; 14:57:49 keyinst jam.checkpoint.com >daemon src: veredr.checkpoint.com; peer gateway: veredr.checkpoint.com; scheme: IKE; IKE: Main Mode completion.; CookieI: 32f09ca38aeaf4a3; CookieR: 73b91d59b378958c; msgid: 47ad4a8d; methods: AES-256 + SHA1, Internal Password; user: a; product: Security Gateway; [[category: man pages R75]] 89 88 2013-05-09T16:15:43Z Nighthawk 1 wikitext text/x-wiki '''fw log''' '''Description''' fw log displays the content of Log files. '''Usage''' fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert_name|all)] [-g] [logfile] '''Syntax''' {| cellspacing="5" border="1" ! valign="top"|Argument ! Description |- | -f [-t] |After reaching the end of the currently displayed file, do not exit (the default behavior), but continue to monitor the Log file indefinitely and display it while it is being written. The -t parameter indicates that the display is to begin at the end of the file, in other words, the display will initially be empty and only new records added later will be displayed. -t must come with a -f flag. These flags are relevant only for active files. |- | -n | Do not perform DNS resolution of the IP addresses in the Log file (the default behavior). This option significantly speeds up the processing. |- | -l | Display both the date and the time for each log record (the default is to show the date only once above the relevant records, and then specify the time per log record). |- | -o | Show detailed log chains (all the log segments a log record consists of). |- | -c action | Display only events whose action is action, that is, accept, drop, reject, authorize, deauthorize, encrypt and decrypt. Control actions are always displayed. |- | -h host | Display only log whose origin is the specified IP address or name. |- | -s starttime | Display only events that were logged after the specified time (see format below). starttime may be a date, a time, or both. If date is omitted, then today's date is assumed. |- | -e endtime | Display only events that were logged before the specified time (see format below). endtime may be a date, a time, or both. |- | -b starttime endtime | Display only events that were logged between the specified start and end times (see format below), each of which may be a date, a time, or both. If date is omitted, then today's date is assumed. The start and end times are expected after the flag. |- | -u Unification scheme file name. | unification_scheme_file |- | -m unification_mode | This flag specifies the unification mode.  initial - the default mode, specifying complete unification of log records; that is, output one unified record for each id. This is the default. When used together with -f, no updates will be displayed, but only entries relating to the start of new connections. To display updates, use the semi parameter.  semi - step-by-step unification, that is, for each log record, output a record that unifies this record with all previously-encountered records with the same id.  raw - output all records, with no unification. |- | -a | Output account log records only. |- | -k alert_name |Display only events that match a specific alert type. The default is all, for any alert type. |- | -g | Do not use a delimited style. The default is:  : after field name  ; after field value |- | logfile | se logfile instead of the default Log file. The default Log File is $FWDIR/log/fw.log. |} Where the full date and time format is: MMM DD, YYYY HH:MM:SS. For example: May 26, 1999 14:20:00 It is possible to specify date only in the format MMM DD, YYYY, or time only, in the format: HH:MM:SS, where time only is specified, the current date is assumed. '''Example''' fw log fw log | more fw log -c reject fw log -s "May 26, 1999" fw log -f -s 16:00:00 '''Output''' [<date>] <time> <action> <origin> <interface dir and name> [alert] [field name: field value;] ... Each output line consists of a single log record, whose fields appear in the format shown above. '''Example''' 14:56:39 reject jam.checkpoint.com >daemon alert src: veredr.checkpoint.com; dst: jam.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Access denied - wrong user name or password ; scheme: IKE; reject_category: Authentication error; product: Security Gateway 14:57:49 authcrypt jam.checkpoint.com >daemon src: veredr.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Authenticated by Internal Password; scheme: IKE; methods: AES- 256,IKE,SHA1; product: Security Gateway; 14:57:49 keyinst jam.checkpoint.com >daemon src: veredr.checkpoint.com; peer gateway: veredr.checkpoint.com; scheme: IKE; IKE: Main Mode completion.; CookieI: 32f09ca38aeaf4a3; CookieR: 73b91d59b378958c; msgid: 47ad4a8d; methods: AES-256 + SHA1, Internal Password; user: a; product: Security Gateway; [[category: man pages R75]] 88 87 2013-05-09T16:14:49Z Nighthawk 1 wikitext text/x-wiki '''fw log''' '''Description''' fw log displays the content of Log files. '''Usage''' fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert_name|all)] [-g] [logfile] '''Syntax''' {| cellspacing="5" border="1" ! align="left" valign="top"|Argument ! Description |- | -f [-t] |After reaching the end of the currently displayed file, do not exit (the default behavior), but continue to monitor the Log file indefinitely and display it while it is being written. The -t parameter indicates that the display is to begin at the end of the file, in other words, the display will initially be empty and only new records added later will be displayed. -t must come with a -f flag. These flags are relevant only for active files. |- | -n | Do not perform DNS resolution of the IP addresses in the Log file (the default behavior). This option significantly speeds up the processing. |- | -l | Display both the date and the time for each log record (the default is to show the date only once above the relevant records, and then specify the time per log record). |- | -o | Show detailed log chains (all the log segments a log record consists of). |- | -c action | Display only events whose action is action, that is, accept, drop, reject, authorize, deauthorize, encrypt and decrypt. Control actions are always displayed. |- | -h host | Display only log whose origin is the specified IP address or name. |- | -s starttime | Display only events that were logged after the specified time (see format below). starttime may be a date, a time, or both. If date is omitted, then today's date is assumed. |- | -e endtime | Display only events that were logged before the specified time (see format below). endtime may be a date, a time, or both. |- | -b starttime endtime | Display only events that were logged between the specified start and end times (see format below), each of which may be a date, a time, or both. If date is omitted, then today's date is assumed. The start and end times are expected after the flag. |- | -u Unification scheme file name. | unification_scheme_file |- | -m unification_mode | This flag specifies the unification mode.  initial - the default mode, specifying complete unification of log records; that is, output one unified record for each id. This is the default. When used together with -f, no updates will be displayed, but only entries relating to the start of new connections. To display updates, use the semi parameter.  semi - step-by-step unification, that is, for each log record, output a record that unifies this record with all previously-encountered records with the same id.  raw - output all records, with no unification. |- | -a | Output account log records only. |- | -k alert_name |Display only events that match a specific alert type. The default is all, for any alert type. |- | -g | Do not use a delimited style. The default is:  : after field name  ; after field value |- | logfile | se logfile instead of the default Log file. The default Log File is $FWDIR/log/fw.log. |} Where the full date and time format is: MMM DD, YYYY HH:MM:SS. For example: May 26, 1999 14:20:00 It is possible to specify date only in the format MMM DD, YYYY, or time only, in the format: HH:MM:SS, where time only is specified, the current date is assumed. '''Example''' fw log fw log | more fw log -c reject fw log -s "May 26, 1999" fw log -f -s 16:00:00 '''Output''' [<date>] <time> <action> <origin> <interface dir and name> [alert] [field name: field value;] ... Each output line consists of a single log record, whose fields appear in the format shown above. '''Example''' 14:56:39 reject jam.checkpoint.com >daemon alert src: veredr.checkpoint.com; dst: jam.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Access denied - wrong user name or password ; scheme: IKE; reject_category: Authentication error; product: Security Gateway 14:57:49 authcrypt jam.checkpoint.com >daemon src: veredr.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Authenticated by Internal Password; scheme: IKE; methods: AES- 256,IKE,SHA1; product: Security Gateway; 14:57:49 keyinst jam.checkpoint.com >daemon src: veredr.checkpoint.com; peer gateway: veredr.checkpoint.com; scheme: IKE; IKE: Main Mode completion.; CookieI: 32f09ca38aeaf4a3; CookieR: 73b91d59b378958c; msgid: 47ad4a8d; methods: AES-256 + SHA1, Internal Password; user: a; product: Security Gateway; [[category: man pages R75]] 87 2013-05-09T16:13:16Z Nighthawk 1 Created page with "'''fw log''' '''Description''' fw log displays the content of Log files. '''Usage''' fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b st..." wikitext text/x-wiki '''fw log''' '''Description''' fw log displays the content of Log files. '''Usage''' fw log [-f [-t]] [-n] [-l] [-o] [-c action] [-h host] [-s starttime] [-e endtime] [-b starttime endtime] [-u unification_scheme_file] [-m unification_mode(initial|semi|raw)] [-a] [-k (alert_name|all)] [-g] [logfile] '''Syntax''' {| cellspacing="5" border="1" ! align="left"|Argument ! Description |- | -f [-t] |After reaching the end of the currently displayed file, do not exit (the default behavior), but continue to monitor the Log file indefinitely and display it while it is being written. The -t parameter indicates that the display is to begin at the end of the file, in other words, the display will initially be empty and only new records added later will be displayed. -t must come with a -f flag. These flags are relevant only for active files. |- | -n | Do not perform DNS resolution of the IP addresses in the Log file (the default behavior). This option significantly speeds up the processing. |- | -l | Display both the date and the time for each log record (the default is to show the date only once above the relevant records, and then specify the time per log record). |- | -o | Show detailed log chains (all the log segments a log record consists of). |- | -c action | Display only events whose action is action, that is, accept, drop, reject, authorize, deauthorize, encrypt and decrypt. Control actions are always displayed. |- | -h host | Display only log whose origin is the specified IP address or name. |- | -s starttime | Display only events that were logged after the specified time (see format below). starttime may be a date, a time, or both. If date is omitted, then today's date is assumed. |- | -e endtime | Display only events that were logged before the specified time (see format below). endtime may be a date, a time, or both. |- | -b starttime endtime | Display only events that were logged between the specified start and end times (see format below), each of which may be a date, a time, or both. If date is omitted, then today's date is assumed. The start and end times are expected after the flag. |- | -u Unification scheme file name. | unification_scheme_file |- | -m unification_mode | This flag specifies the unification mode.  initial - the default mode, specifying complete unification of log records; that is, output one unified record for each id. This is the default. When used together with -f, no updates will be displayed, but only entries relating to the start of new connections. To display updates, use the semi parameter.  semi - step-by-step unification, that is, for each log record, output a record that unifies this record with all previously-encountered records with the same id.  raw - output all records, with no unification. |- | -a | Output account log records only. |- | -k alert_name |Display only events that match a specific alert type. The default is all, for any alert type. |- | -g | Do not use a delimited style. The default is:  : after field name  ; after field value |- | logfile | se logfile instead of the default Log file. The default Log File is $FWDIR/log/fw.log. |} Where the full date and time format is: MMM DD, YYYY HH:MM:SS. For example: May 26, 1999 14:20:00 It is possible to specify date only in the format MMM DD, YYYY, or time only, in the format: HH:MM:SS, where time only is specified, the current date is assumed. '''Example''' fw log fw log | more fw log -c reject fw log -s "May 26, 1999" fw log -f -s 16:00:00 '''Output''' [<date>] <time> <action> <origin> <interface dir and name> [alert] [field name: field value;] ... Each output line consists of a single log record, whose fields appear in the format shown above. '''Example''' 14:56:39 reject jam.checkpoint.com >daemon alert src: veredr.checkpoint.com; dst: jam.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Access denied - wrong user name or password ; scheme: IKE; reject_category: Authentication error; product: Security Gateway 14:57:49 authcrypt jam.checkpoint.com >daemon src: veredr.checkpoint.com; user: a; rule: 0; reason: Client Encryption: Authenticated by Internal Password; scheme: IKE; methods: AES- 256,IKE,SHA1; product: Security Gateway; 14:57:49 keyinst jam.checkpoint.com >daemon src: veredr.checkpoint.com; peer gateway: veredr.checkpoint.com; scheme: IKE; IKE: Main Mode completion.; CookieI: 32f09ca38aeaf4a3; CookieR: 73b91d59b378958c; msgid: 47ad4a8d; methods: AES-256 + SHA1, Internal Password; user: a; product: Security Gateway; [[category: man pages R75]] Check Point rma shipping address 0 33 38 37 2013-02-27T20:01:28Z Nighthawk 1 moved [[Check point rma]] to [[Check Point rma shipping address]] wikitext text/x-wiki return shipping link<br> http://www.checkpoint.com/services/techsupport/programs/rma-return-process.html [[category:check point]] 37 2013-02-27T20:00:40Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki return shipping link<br> http://www.checkpoint.com/services/techsupport/programs/rma-return-process.html [[category:check point]] Check point automatic rule creation notes 0 18 22 2013-02-26T00:02:47Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki query user for group names to put objects in input change ticket numbers into dbedit command using -r switch create dbversion after changes are saved using dbver == checking for existing objects == cpmiquerybin attr "" network_objects "ipaddr='95.140.96.0'<del>,netmask='255.255.240.0'</del>" -a __name__ <<< '''can't submit 2 queries?''' cpmiquerybin attr "" network_objects "ipaddr='$ipaddr'" -a __name__ <<< '''could return multiple matches!!!''' [[category:work]] Check point cma startup problem 0 20 24 2013-02-26T00:15:53Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == problem description == attempts to start CMA fail as in the following: [Expert@mds1]# '''mdscmd startcma cusotmer_name -i 192.168.1.100''' Failed to start CMA my_customer_name: While attempting to initialize, the CMA reached a timeout. Wait a few minutes before working with the CMA. mdsstat for CMA after attemped start. ^ CMA ^customer_name ^ 192.168.1.100 ^ down ^ down ^ down ^ down ^ == solution == This is happening due to the registry file (HKLM_registry.data) getting corrupted. If there is a backup, please replace this file withi the CMA environment ($CPDIR/registry) #cd /var/backup #identify a backup with the appropriate date #move or copy it to a tmp dir #unzip it and untar it #you will then have more tgz files #unpack mds_backup_var_opt.tgz #replace the cma registiry file with the one from the backup [[category:check point]] Check point firewall command reference 0 95 155 2013-06-21T15:44:23Z Nighthawk 1 moved [[Check point firewall command reference]] to [[fw log command line example]] wikitext text/x-wiki #REDIRECT [[fw log command line example]] Check point kernel module version 0 22 26 2013-02-26T00:21:50Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki cpvinfo <path_to_fwmod.o> cpvinfo $FWDIR/boot/modules/fwmod.o cpvinfo $FWDIR/boot/modules/fwmod.o | grep -E "Build|Release" [[category:check point]] Check point license repository 0 19 792 23 2018-06-23T12:08:22Z Nighthawk 1 wikitext text/x-wiki '''Problem description:''' A firewall was deleted without detaching a central license. The firewall object was recreated with a new name. Attempts to attach a license with smart update failed with an error to the effect that no unattached licenses were available. I obtained the certificate key from the firewall database. A search was performed on the check point user center with the key. It was downloaded into a file and an attempt to add it to the repository failed with a message that it already existed. version: r75 or r77 (don't remember) '''Solution:''' 1) connect to the provider-1 MDS and stop the cma vi '''mdscmd stopcma ''customer_name'' -i ''cma_ip''''' 2) '''mdsenv ''cma_ip''''' 3) '''mcd conf''' 4) '''cp licenses.c licenses.c.bak''' 5) vi licenses.c and manually delete the problem license(you have to figure out what lines the definition of the license object start and end at) 6) vi smart update GUI ...re-add the license back to the repository and 7) attach the license to the firewall [[category:check point]] a2daf607e4127ffa585e5505ef2aba3b612aa016 23 2013-02-26T00:13:03Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki '''Problem description:''' A firewall was deleted without detaching a central license. The firewall object was recreated with a new name. Attempts to attach a license with smart update failed with an error to the effect that no unattached licenses were available. I obtained the certificate key from the firewall database. A search was performed on the check point user center with the key. It was downloaded into a file and an attempt to add it to the repository failed with a message that it already existed. '''Solution:''' 1) connect to the provider-1 MDS and stop the cma vi '''mdscmd stopcma ''customer_name'' -i ''cma_ip''''' 2) '''mdsenv ''cma_ip''''' 3) '''mcd conf''' 4) '''cp licenses.c licenses.c.bak''' 5) vi licenses.c and manually delete the problem license(you have to figure out what lines the definition of the license object start and end at) 6) vi smart update GUI ...re-add the license back to the repository and 7) attach the license to the firewall [[category:check point]] Check point product installation info 0 32 36 2013-02-27T20:00:01Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki How to tell what products are installed on your Check Point server SOLUTION Run the command: cpprod_util CPPROD_GetKeyValues Products 0 [[category:check point]] Check point service ports 0 25 719 29 2018-03-16T15:15:00Z Nighthawk 1 wikitext text/x-wiki [[File:cpportsr77.png]] 256 /tcp FW1 Check Point VPN-1 & FireWall-1 Service - Download of rulebase from management server to gateway (4.x) - Fetching rulebase from gateway to management server when starting (4.x) - Get topology information from management server or Customer Management Add-on (CMA) to gateway - Full synchronization for HA configuration 257 /tcp FW1_log Check Point Logs - Protocol used for delivering logs from gateway to management server - Protocol used for delivering logs from gateway to CMA or Customer Log Module 258 /tcp FW1_mgmt Check Point VPN-1 & FireWall-1 Management (Version 4.x, obsolete) - Protocol for communInternal Certificate Authority between SmartConsole applInternal Certificate Authority's and the management server 259 /tcp FW1_clntauth, FW1_clntauth_telnet Check Point VPN-1 & FireWall-1 Client AuthentInternal Certificate Authority (Telnet) - Protocol for performing Client-AuthentInternal Certificate Authority at gateway using telnet 259 /udp RDP Check Point VPN-1 FWZ Key Negotiations - Reliable Datagram Protocol - Protocol used for FWZ VPN (supported up to NG FP1 only) - Protocol used by SecuRemote/SCl for checking the availability of the gateway/PS 260 /udp FW1_snmp Check Point SNMP Agent - Check Point's SNMP, used additionally to 161/udp (snmp) 261 /tcp FW1_snauth Check Point Session AuthentInternal Certificate Authority - Protocol for Session AuthentInternal Certificate Authority between gateway and SAA 262 /tcp - not predefined - only internally used by Mail Dequerer (process: mdq) 264 /tcp FW1_topo Check Point VPN-1 SecuRemote Topology Requests - Topology Download for SecuRemote (build 4100 and higher) and SCl 265 /tcp FW1_key Check Point VPN-1 Public Key Transfer Protocol - Protocol for exchanging CA- and DH-keys between management servers (SKIP, FWZ (4.x)) - Public Key download for SecuRemote/SecureClient 900 /tcp FW1_clntauth, FW1_clntauth_http Check Point Client AuthentICA (HTTP) - Protocol for performing Client-AuthentICA at gateway using HTTP 981 /tcp - not predefined - Check Point UTM-1 Edge remote administration from external using HTTPS 2746 /udp VPN1_IPSEC_encapsulation SecuRemote IPSEC Transport Encapsulation Protocol - Default-Protocol used for UDP encapsulation 4532 / tcp - not predefined - only internally used by Session AuthentICA (in.asessiond) 5004 /udp MetaIP-UAT Check Point Meta IP UAM Client-Server Comanagement serverunInternal Certificate Authority 8116 /udp - not predefined - Check Point Cluster Control Protocol - Protocol for communICA between High Availability Cluster Members. Used for e.g. report/query state, probing, load balancing 8989 /tcp - not predefined - only internally used by Customer Management Add-on for Session Authentication 9281 /udp SWTP_Gateway VPN-1 Embedded / SofaWare Management Server (SMS) - Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge) 9282 /udp SWTP_SMS VPN-1 Embedded / SofaWare Management Server (SMS) - Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge) 18181 /tcp FW1_cvp Check Point OPSEC Content Vectoring Protocol - Protocol used for comanagement serverunICA between gateway and AntiVirus Server 18182 /tcp FW1_ufp Check Point OPSEC URL Filtering Protocol - Protocol used for comanagement serverunICA between gateway and Server for Content Control (e.g. Web Content) 18183 /tcp FW1_sam Check Point OPSEC Suspicious Activity Monitor API - Protocol e.g. for Block Intruder between management server (or CMA) and gateway 18184 /tcp FW1_lea Check Point OPSEC Log Export API - Protocol for exporting logs from management server 18185 /tcp FW1_omi Check Point OPSEC Objects Management Interface - Protocol used by applICA's having access to the ruleset saved at management server 18186 /tcp FW1_omi-sic Check Point OPSEC Objects Management Interface with Secure Internal Communication (SIC) - Protocol used by applICA's having access to the ruleset saved at management server 18187 /tcp FW1_ela Check Point OPSEC Event Logging API - Protocol for applICA's logging to the gateway log at management server 18190 /tcp CPMI Check Point Management Interface - Protocol used for communicatopn ICA between the SmartConsole and the SmartCenter/SecurityManagement Server. - Protocol for connections from Multi-Domain GUI to MDS and CMA 18191 /tcp CPD Check Point Daemon Protocol - Download of rulebase from management server to gateway - Fetching rulebase, from gateway to management server when starting gateway - Download of rulebase from CMA/MDS to gateway - Fetching rulebase, from gateway to CMA when starting gateway 18192 /tcp CPD_amon Check Point Internal ApplCA Monitoring - Protocol for getting System Status, from management server or CMA/MDS to gateway 18193 /tcp FW1_amon Check Point OPSEC ApplInternal Certificate Authority Monitoring - Protocol for monitoring apps, e.g. from management server to CVP server 18202 /tcp CP_rtm Check Point RTM Log - Protocol used by Real Time Monitor (SmartView Monitor) 18205 /tcp CP_reporting Check Point Reporting client - Protocol used by Reporting client when connecting to Reporting Server (management server) 18207 /tcp FW1_pslogon Check Point Policy Server Logon protocol - Protocol used for download of Desktop Security from the Policy Server to SecureClient (4.x) 18208 /tcp FW1_CPRID Check Point Remote Installation Protocol - Protocol used from management server to gateway when installing Secure Updates. 18209 /tcp - not predefined - Protocol used in SIC for communication between the management server, containing the Internal Certificate Authority (ICA) and objects, such as gateways and OPSEC applications, managed by the management sever 18210 /tcp FW1_Internal Certificate Authority_pull Check Point ICA Pull - Protocol used by SIC for e.g. gateway pulling certificates from a management server 18211 /tcp FW1_Internal Certificate Authority_push Used to push certificates from the ICA. - Protocol used by SIC for pushing CA's from management server or CMA/MDS to gateway 18212 /udp FW1_load_agent Check Point ConnectControl Load Agent - Default-Port for Load Agent running on load-balanced Servers (e.g. WWW, FTP) 18221 /tcp CP_redundant Check Point Redundant Management Protocol - Protocol used for synchronizing primary and secondary management server - Protocol used for synchronizing CMA between primary and secondary MDS 18231 /tcp FW1_pslogon_NG Check Point NG Policy Server Logon protocol (NG) - Protocol used for download of Desktop Security from the Policy Server to SecureClient 18232 /tcp FW1_sds_logon Check Point SecuRemote Distribution Server Protocol - Protocol for software distribution of Check Point components 18233 /udp FW1_scv_keep_alive Check Point SecureClient VerifICA KeepAlive Protocol - Protocol for Secure Configuration VerifICA on SecureClient 18234 /udp tunnel_test Check Point tunnel testing ICA - Protocol for testing ICA through VPN, used by SecuRemote/SecureClient 18241 /udp E2ECP Check Point End to End Control Protocol - Protocol to check SLA's defined in Virtual Links by SmartView Monitor 18262 /tcp CP_Exnet_PK Check Point Extrnet public key advertisement - Protocol for exchange of public keys when configuring Extranet not supported since NG AI R55 18263 /tcp CP_Exnet_resolve Check Point Extranet remote objects resolution - Protocol for importing exported objects from partner in Extranet not supported since NG AI R55 18264 /tcp FW1_Internal Certificate Authority_services Check Point ICA Fetch CRL and User Registration Services - Protocol for Certificate Revocation Lists and registering users when using the Policy Server - needed when e.g. gateway is starting 18265 /tcp FW1_Internal Certificate Authority_mgmt_tools Check Point ICA Management Tools - Protocol for managing the ICA, also used for central administration of Internal Certificate Authority on the management server. - needs to be started separately with the comanagement server and cpca_client 19190 /tcp FW1_netso Check Point User Authority simple protocol - Protocol used for UserAuthority for connecting from the UserAuthority Server to the Web Plugin when authenticating using certificates generated by the ICA 19191 /tcp FW1_uaa Check Point OPSEC User Authority API - Protocol for connections to the UserAuthority Server 19194 /udp CP_SecureAgent-udp SecureAgent Authentication ICA service 19195 /udp CP_SecureAgent-udp SecureAgent Authentication tICA service 60709 /tcp - not predefined - Internally used by SecurePlatform for web based system administration (process: cpwmd). Bound to localhost, so no remote connect is possible. 65524 /tcp FW1_sds_logon_NG Check Point SecuRemote Distribution Server Protocol - Protocol for software distribution of Check Point components in Next Generation Additionally defined: Internet Protocol 17 (tunnel_test_mapped), tunnel testing for a module performing the tunnel test Internet Protocol 94 (FW1_Encapsulation), Check Point VPN-1 SecuRemote FWZ Encapsulation Protocol Internet Protocol 112 (Virtual Router Redundancy Protocol), HA for IPSO - since NG AI [[category:check point]] 41de65e138038dd86bcae2cda70f45f5d05badcd 29 2013-02-26T00:27:29Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki 256 /tcp FW1 Check Point VPN-1 & FireWall-1 Service - Download of rulebase from management server to gateway (4.x) - Fetching rulebase from gateway to management server when starting (4.x) - Get topology information from management server or Customer Management Add-on (CMA) to gateway - Full synchronization for HA configuration 257 /tcp FW1_log Check Point Logs - Protocol used for delivering logs from gateway to management server - Protocol used for delivering logs from gateway to CMA or Customer Log Module 258 /tcp FW1_mgmt Check Point VPN-1 & FireWall-1 Management (Version 4.x, obsolete) - Protocol for communInternal Certificate Authority between SmartConsole applInternal Certificate Authority's and the management server 259 /tcp FW1_clntauth, FW1_clntauth_telnet Check Point VPN-1 & FireWall-1 Client AuthentInternal Certificate Authority (Telnet) - Protocol for performing Client-AuthentInternal Certificate Authority at gateway using telnet 259 /udp RDP Check Point VPN-1 FWZ Key Negotiations - Reliable Datagram Protocol - Protocol used for FWZ VPN (supported up to NG FP1 only) - Protocol used by SecuRemote/SCl for checking the availability of the gateway/PS 260 /udp FW1_snmp Check Point SNMP Agent - Check Point's SNMP, used additionally to 161/udp (snmp) 261 /tcp FW1_snauth Check Point Session AuthentInternal Certificate Authority - Protocol for Session AuthentInternal Certificate Authority between gateway and SAA 262 /tcp - not predefined - only internally used by Mail Dequerer (process: mdq) 264 /tcp FW1_topo Check Point VPN-1 SecuRemote Topology Requests - Topology Download for SecuRemote (build 4100 and higher) and SCl 265 /tcp FW1_key Check Point VPN-1 Public Key Transfer Protocol - Protocol for exchanging CA- and DH-keys between management servers (SKIP, FWZ (4.x)) - Public Key download for SecuRemote/SecureClient 900 /tcp FW1_clntauth, FW1_clntauth_http Check Point Client AuthentICA (HTTP) - Protocol for performing Client-AuthentICA at gateway using HTTP 981 /tcp - not predefined - Check Point UTM-1 Edge remote administration from external using HTTPS 2746 /udp VPN1_IPSEC_encapsulation SecuRemote IPSEC Transport Encapsulation Protocol - Default-Protocol used for UDP encapsulation 4532 / tcp - not predefined - only internally used by Session AuthentICA (in.asessiond) 5004 /udp MetaIP-UAT Check Point Meta IP UAM Client-Server Comanagement serverunInternal Certificate Authority 8116 /udp - not predefined - Check Point Cluster Control Protocol - Protocol for communICA between High Availability Cluster Members. Used for e.g. report/query state, probing, load balancing 8989 /tcp - not predefined - only internally used by Customer Management Add-on for Session Authentication 9281 /udp SWTP_Gateway VPN-1 Embedded / SofaWare Management Server (SMS) - Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge) 9282 /udp SWTP_SMS VPN-1 Embedded / SofaWare Management Server (SMS) - Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge) 18181 /tcp FW1_cvp Check Point OPSEC Content Vectoring Protocol - Protocol used for comanagement serverunICA between gateway and AntiVirus Server 18182 /tcp FW1_ufp Check Point OPSEC URL Filtering Protocol - Protocol used for comanagement serverunICA between gateway and Server for Content Control (e.g. Web Content) 18183 /tcp FW1_sam Check Point OPSEC Suspicious Activity Monitor API - Protocol e.g. for Block Intruder between management server (or CMA) and gateway 18184 /tcp FW1_lea Check Point OPSEC Log Export API - Protocol for exporting logs from management server 18185 /tcp FW1_omi Check Point OPSEC Objects Management Interface - Protocol used by applICA's having access to the ruleset saved at management server 18186 /tcp FW1_omi-sic Check Point OPSEC Objects Management Interface with Secure Internal Communication (SIC) - Protocol used by applICA's having access to the ruleset saved at management server 18187 /tcp FW1_ela Check Point OPSEC Event Logging API - Protocol for applICA's logging to the gateway log at management server 18190 /tcp CPMI Check Point Management Interface - Protocol used for communicatopn ICA between the SmartConsole and the SmartCenter/SecurityManagement Server. - Protocol for connections from Multi-Domain GUI to MDS and CMA 18191 /tcp CPD Check Point Daemon Protocol - Download of rulebase from management server to gateway - Fetching rulebase, from gateway to management server when starting gateway - Download of rulebase from CMA/MDS to gateway - Fetching rulebase, from gateway to CMA when starting gateway 18192 /tcp CPD_amon Check Point Internal ApplCA Monitoring - Protocol for getting System Status, from management server or CMA/MDS to gateway 18193 /tcp FW1_amon Check Point OPSEC ApplInternal Certificate Authority Monitoring - Protocol for monitoring apps, e.g. from management server to CVP server 18202 /tcp CP_rtm Check Point RTM Log - Protocol used by Real Time Monitor (SmartView Monitor) 18205 /tcp CP_reporting Check Point Reporting client - Protocol used by Reporting client when connecting to Reporting Server (management server) 18207 /tcp FW1_pslogon Check Point Policy Server Logon protocol - Protocol used for download of Desktop Security from the Policy Server to SecureClient (4.x) 18208 /tcp FW1_CPRID Check Point Remote Installation Protocol - Protocol used from management server to gateway when installing Secure Updates. 18209 /tcp - not predefined - Protocol used in SIC for communication between the management server, containing the Internal Certificate Authority (ICA) and objects, such as gateways and OPSEC applications, managed by the management sever 18210 /tcp FW1_Internal Certificate Authority_pull Check Point ICA Pull - Protocol used by SIC for e.g. gateway pulling certificates from a management server 18211 /tcp FW1_Internal Certificate Authority_push Used to push certificates from the ICA. - Protocol used by SIC for pushing CA's from management server or CMA/MDS to gateway 18212 /udp FW1_load_agent Check Point ConnectControl Load Agent - Default-Port for Load Agent running on load-balanced Servers (e.g. WWW, FTP) 18221 /tcp CP_redundant Check Point Redundant Management Protocol - Protocol used for synchronizing primary and secondary management server - Protocol used for synchronizing CMA between primary and secondary MDS 18231 /tcp FW1_pslogon_NG Check Point NG Policy Server Logon protocol (NG) - Protocol used for download of Desktop Security from the Policy Server to SecureClient 18232 /tcp FW1_sds_logon Check Point SecuRemote Distribution Server Protocol - Protocol for software distribution of Check Point components 18233 /udp FW1_scv_keep_alive Check Point SecureClient VerifICA KeepAlive Protocol - Protocol for Secure Configuration VerifICA on SecureClient 18234 /udp tunnel_test Check Point tunnel testing ICA - Protocol for testing ICA through VPN, used by SecuRemote/SecureClient 18241 /udp E2ECP Check Point End to End Control Protocol - Protocol to check SLA's defined in Virtual Links by SmartView Monitor 18262 /tcp CP_Exnet_PK Check Point Extrnet public key advertisement - Protocol for exchange of public keys when configuring Extranet not supported since NG AI R55 18263 /tcp CP_Exnet_resolve Check Point Extranet remote objects resolution - Protocol for importing exported objects from partner in Extranet not supported since NG AI R55 18264 /tcp FW1_Internal Certificate Authority_services Check Point ICA Fetch CRL and User Registration Services - Protocol for Certificate Revocation Lists and registering users when using the Policy Server - needed when e.g. gateway is starting 18265 /tcp FW1_Internal Certificate Authority_mgmt_tools Check Point ICA Management Tools - Protocol for managing the ICA, also used for central administration of Internal Certificate Authority on the management server. - needs to be started separately with the comanagement server and cpca_client 19190 /tcp FW1_netso Check Point User Authority simple protocol - Protocol used for UserAuthority for connecting from the UserAuthority Server to the Web Plugin when authenticating using certificates generated by the ICA 19191 /tcp FW1_uaa Check Point OPSEC User Authority API - Protocol for connections to the UserAuthority Server 19194 /udp CP_SecureAgent-udp SecureAgent Authentication ICA service 19195 /udp CP_SecureAgent-udp SecureAgent Authentication tICA service 60709 /tcp - not predefined - Internally used by SecurePlatform for web based system administration (process: cpwmd). Bound to localhost, so no remote connect is possible. 65524 /tcp FW1_sds_logon_NG Check Point SecuRemote Distribution Server Protocol - Protocol for software distribution of Check Point components in Next Generation Additionally defined: Internet Protocol 17 (tunnel_test_mapped), tunnel testing for a module performing the tunnel test Internet Protocol 94 (FW1_Encapsulation), Check Point VPN-1 SecuRemote FWZ Encapsulation Protocol Internet Protocol 112 (Virtual Router Redundancy Protocol), HA for IPSO - since NG AI [[category:check point]] Check point state sync interface problem 0 21 25 2013-02-26T00:21:14Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki '''Problem description''' State table sync was not working between firewall-1 and firewall-2 after upgrading from R65 to R70.1. Fw ctl pstat showed sync packets sent, but zero received on both firewalls. The aggregate link was setup properly in IPSO and the firewalls could ping each other’s sync interfaces. The real problem symptom was that the firewall didn’t recognize any of its interfaces as being sync interfaces as seen below. Also, the configuration of the firewalls was double checked by Mark Stapp and Check Point support. All firewall configurations appeared to be correct. '''Symptoms''' 1) Local cpha shows down Example: firewall-1[admin]# '''cphaprob stat''' Cluster Mode: Sync only (IPSO cluster) Number Unique Address Firewall State (*) 2 (local) none Down 2) Cpha interface listing show no sync interfaces configured. However; state sync is enabled properly on the firewall cluster object in the topology and 3rd party configuration options. Example: firewall-2[admin]# cphaprob -a if eth-s4p1c0 non sync(non secured) eth-s1p1c0 non sync(non secured) eth-s1p2c0 non sync(non secured) ae1c0 non sync(non secured)<br> Warning: Sync will not function since there aren't any sync(secured) interfaces<br> Virtual cluster interfaces: 2<br> eth-s1p1c0 192.168.100.12 eth-s1p2c0 192.168.254.11 Solution: Some of the steps from the SK39047 linked below were used. https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk39047&js_peid=P-114a7bc3b09-10006&partition=General&product=Security What I ended up doing on firewall-1 was… 1) cpconfig > option 7 > Disable cluster membership for this gateway 2) cpconfig > option 7 > Enable cluster membership for this gateway 3) reboot Afterwards, I had a sync interface on firewall-1. I plan to perform the same function on firewall-2. However, a disruptive failover from firewall-2 to firewall-1 will be required. Since state sync is broken, the failover will severe any statefull connections traversing the upper-rail. After the procedure above was run… firewall-1[admin]# cphaprob -a if eth-s1p1c0 non sync(non secured) eth-s1p2c0 non sync(non secured) eth-s4p1c0 non sync(non secured) ae1c0 sync(secured), multicast <<< hurray!!! Virtual cluster interfaces: 2 eth-s1p1c0 192.168.100.12 eth-s1p2c0 192.168.254.11 firewall-1[admin]# cphaprob stat Cluster Mode: Sync only (IPSO cluster) Number Unique Address Firewall State (*) 1 (local) 1.1.1.1 Active <<<< whoopee!!! [[category:check point]] Checking for queue drops 0 28 32 2013-02-26T00:38:50Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki ipsctl -a |egrep "in_qdrop|out_qdrop" [[category:check point]] Clish logical interfaces 0 72 546 545 2014-11-07T15:16:33Z Nighthawk 1 wikitext text/x-wiki from the manual... When adding a logical interface (in addition to the default logical interface), specify the physical interface. When adding a logical interface, you must specify a VLAN ID. example: add interface eth4 vlanid 2544 address 192.168.1.1/24 == delete interface ip == delete interface eth-s4p1c0 address 192.168.1.1 [[category:nokia]] 545 207 2014-11-07T15:15:52Z Nighthawk 1 /* delete interface ip */ wikitext text/x-wiki from the manual... When adding a logical interface (in addition to the default logical interface), specify the physical interface. When adding a logical interface, you must specify a VLAN ID. example: add interface eth4 vlanid 2544 address 172.24.108.1/30 == delete interface ip == delete interface eth-s4p1c0 address 192.168.1.1 [[category:nokia]] 207 101 2013-08-23T22:15:50Z Nighthawk 1 wikitext text/x-wiki from the manual... When adding a logical interface (in addition to the default logical interface), specify the physical interface. When adding a logical interface, you must specify a VLAN ID. example: add interface eth4 vlanid 2544 address 172.24.108.1/30 == delete interface ip == delete interface eth-s4p1c0 address 171.178.245.11 [[category:nokia]] 101 2013-05-17T18:25:59Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki from the manual When adding a logical interface (in addition to the default logical interface), specify the physical interface. When adding a logical interface, you must specify a VLAN ID. example: add interface eth4 vlanid 2544 address 172.24.108.1/30 == delete interface ip == delete interface eth-s4p1c0 address 171.178.245.11 [[category:nokia]] Configuring Security Gateway Modules as Up or Down (asg blade admin) 0 153 426 425 2014-04-20T03:08:47Z Nighthawk 1 wikitext text/x-wiki '''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description:''' Administer the Security Gateway Modules (blades). Administratively turn the blades on and off. '''Syntax''' asg_blade_admin -b blade_string <up|down> [-p] {| ! Parameter ! Description |- | blade_string | List of Security Gateway Modules. For example: 1_01 Chassis 1 SGM 1 1_03-1_05 Chassis 1 SGMs 3, 4 and 5. 1_01,1_03-1_05 Combination of previous two items all All SGMs (including chassis 2, if applicable) chassis1 All SGMs in Chassis 1 chassis2 All SGMs in chassis 2 chassis_active All SGMs in the active chassis |- | -p | Persistent. TheDisplay usage setting iskept after reboot. |- | -h | Display usage |} Example # asg_blade_admin -b 2_03 up -p [[category:61000]] 425 424 2014-04-20T02:55:34Z Nighthawk 1 wikitext text/x-wiki '''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description:''' Administer the Security Gateway Modules (blades). Administratively turn the blades on and off. '''Syntax''' asg_blade_admin -b blade_string <up|down> [-p] {| ! Parameter ! Description |- | blade_string | List of Security Gateway Modules. For example: 1_01 Chassis 1 SGM 1 1_03-1_05 Chassis 1 SGMs 3, 4 and 5. 1_01,1_03-1_05 Combination of previous two items all All SGMs (including chassis 2, if applicable) chassis1 All SGMs in Chassis 1 chassis2 All SGMs in chassis 2 chassis_active All SGMs in the active chassis |- | -p | Persistent. TheDisplay usage setting iskept after reboot. |- | -h | Display usage |} Example # asg_blade_admin -b 2_03 up -p [[category:61000]] 424 423 2014-04-20T02:55:13Z Nighthawk 1 wikitext text/x-wiki '''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description:''' Administer the Security Gateway Modules (blades). Administratively turn the blades on and off. '''Syntax''' asg_blade_admin -b blade_string <up|down> [-p] {| ! Parameter ! Description |- | blade_string | List of Security Gateway Modules. For example: 1_01 Chassis 1 SGM 1 1_03-1_05 Chassis 1 SGMs 3, 4 and 5. 1_01,1_03-1_05 Combination of previous two items all All SGMs (including chassis 2, if applicable) chassis1 All SGMs in Chassis 1 chassis2 All SGMs in chassis 2 chassis_active All SGMs in the active chassis |_ | -p | Persistent. TheDisplay usage setting iskept after reboot. |- | -h | Display usage |} Example # asg_blade_admin -b 2_03 up -p [[category:61000]] 423 422 2014-04-20T02:53:02Z Nighthawk 1 wikitext text/x-wiki '''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description:''' Administer the Security Gateway Modules (blades). Administratively turn the blades on and off. '''Syntax''' asg_blade_admin -b blade_string <up|down> [-p] {| ! Parameter ! Description |- | blade_string | List of Security Gateway Modules. For example: 1_01 Chassis 1 SGM 1 1_03-1_05 Chassis 1 SGMs 3, 4 and 5. 1_01,1_03-1_05 Combination of previous two items all All SGMs (including chassis 2, if applicable) chassis1 All SGMs in Chassis 1 chassis2 All SGMs in chassis 2 chassis_active All SGMs in the active chassis |_ | -p | Persistent. TheDisplay usage setting iskept after reboot. |- | -h | Display usage |} Example # asg_blade_admin -b 2_03 up -p [[category:61000]] 422 2014-04-20T02:52:18Z Nighthawk 1 Created page with "'''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description''' Administer the Security Gateway Modules (blades). Administratively turn the blad..." wikitext text/x-wiki '''Configuring Security Gateway Modules as Up or Down (asg_blade_admin)''' '''Description''' Administer the Security Gateway Modules (blades). Administratively turn the blades on and off. '''Syntax''' asg_blade_admin -b blade_string <up|down> [-p] {| ! Parameter ! Description |- | blade_string | List of Security Gateway Modules. For example: 1_01 Chassis 1 SGM 1 1_03-1_05 Chassis 1 SGMs 3, 4 and 5. 1_01,1_03-1_05 Combination of previous two items all All SGMs (including chassis 2, if applicable) chassis1 All SGMs in Chassis 1 chassis2 All SGMs in chassis 2 chassis_active All SGMs in the active chassis |_ | -p | Persistent. TheDisplay usage setting iskept after reboot. |- | -h | Display usage |} Example # asg_blade_admin -b 2_03 up -p [[category:61000]] Configuring a Chassis as Up or Down 0 147 414 413 2014-04-12T06:04:14Z Nighthawk 1 wikitext text/x-wiki Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> {| cellspacing="1" border="1" ! Parameter ! Description |- | chassis_id | ID of one chassis to be modified (1 / 2) |- | down | up | Chassis state |} Example # asg_chassis_admin -c 2 down [[category:61000]] [[category:HA]] 413 412 2014-04-12T06:03:12Z Nighthawk 1 wikitext text/x-wiki Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> {| cellspacing="5" border="1" ! Parameter ! Description |- | chassis_id | ID of one chassis to be modified (1 / 2) |- | down | up | Chassis state |} Example # asg_chassis_admin -c 2 down [[category:61000]] [[category:HA]] 412 411 2014-04-12T06:02:41Z Nighthawk 1 wikitext text/x-wiki Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> {| ! Parameter ! Description |- | chassis_id | ID of one chassis to be modified (1 / 2) |- | down | up | Chassis state |} Example # asg_chassis_admin -c 2 down [[category:61000]] [[category:HA]] 411 410 2014-04-12T05:59:47Z Nighthawk 1 wikitext text/x-wiki Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> Parameter Description chassis_id: ID of one chassis to be modified (1 / 2) down | up: Chassis state Example # asg_chassis_admin -c 2 down [[category:61000]] [[category:HA]] 410 2014-04-12T05:59:33Z Nighthawk 1 Created page with "Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> Parameter Description chassis_id: ID of one chassis to be modified (1 / 2) down | u..." wikitext text/x-wiki Configuring a Chassis as Up or Down Syntax asg_chassis_admin -c <chassis_id> <down|up> Parameter Description chassis_id: ID of one chassis to be modified (1 / 2) down | up: Chassis state Example # asg_chassis_admin -c 2 down [[category:61000]] [[category:HA]] Cpha / firewall sync troubleshooting 0 35 163 40 2013-07-15T18:05:15Z Nighthawk 1 wikitext text/x-wiki Commands to run: # cphaprob state # cphaprob -ia list # cphaprob -a if # fw ctl pstat # cphaprob syncstat 40 2013-02-27T20:02:19Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Commands to run: # cphaprob state # cphaprob -ia list # cphaprob -a if # fw ctl pstat Cpha status / cphaprob stat down problem 0 16 20 2013-02-25T22:55:10Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == Problem Description == 1) '''cphaprob stat''' shows the partner firewall status is down on BOTH nodes of an HA pair. '''Example:''' firewall-1[admin]# '''cphaprob stat'''<br> Cluster Mode: Sync only (IPSO cluster)<br> Number Unique Address Firewall State (*)<br> 1 (local) 10.10.30.2 Active 2 10.10.30.3 Down 2) fw ctl pstat shows zero packets recieved on BOTH nodes Example: firewall-2[admin]# '''fw ctl pstat|grep -C 1 Sync'''<br> Sync: Version: new Status: Able to Send/Receive sync packets Sync packets sent: total : 326990, retransmitted : 0, retrans reqs : 0, acks : 0 Sync packets received: total : 0, were queued : 0, dropped by net : 0 3) tcpdumps on the sync interface only show OUTBOUND packets, no INBOUND packets (2nd field O=outbound packet) 23:46:26.358170 O 00:00:00:00:fe:00 (oui XEROX CORPORATION) > 01:00:5e:0a:1e:fa (oui Unknown), ethertype NOK sync (0x7005), length 78: CPHA 0.0.0.0.8116 > 10.10.30.0.8116: ifc 0 smach 0 dmach 65534 op ifc-cfg-resp 23:46:26.358173 O 00:00:00:00:fe:00 (oui XEROX CORPORATION) > 01:00:5e:0a:1e:fa (oui Unknown), ethertype NOK sync (0x7005), length 78: CPHA 0.0.0.0.8116 > 10.10.30.0.8116: ifc 0 smach 0 dmach 65534 op ifc-cfg-resp 23:46:26.459135 O 00:00:00:00:fe:00 (oui XEROX CORPORATION) > 01:00:5e:0a:1e:fa (oui Unknown), ethertype NOK sync (0x7005), length 218: CPHA 0.0.0.0.8116 > 10.10.30.0.8116: ifc 0 smach 0 dmach 65534 op new-sync 4) Sync mode set to multicast crx-dev1[admin]# '''cphaprob -a if'''<br> eth4c0 sync(secured), broadcast eth2c1 non sync(non secured) eth2c0 non sync(non secured) eth3c0 sync(secured), broadcast eth1c1 non sync(non secured) == Possible Causes: == Switch problem, physical NIC / cabling problem. == Solution: == for this case... the sync mode was changed from multicast to broadcast firewall-1[admin]# '''cphaconf set_ccp broadcast''' run "cphaprob stat" again and it will show active/active if this fix worked. [[category:check point]] Cpha status / cphaprob stat down problem on one firewall only 0 24 28 2013-02-26T00:26:58Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == Problem Description == '''Symptom 1:''' '''cphaprob stat''' shows the partner firewall status is down on '''only one''' nodes of an HA pair. {| cellspacing="5" border="1" ! Firewall #1 ! Firewall #2 |- | firewall1[admin]# '''cphaprob stat'''<br> Cluster Mode: Sync only (IPSO cluster)<br> Number Unique Address Firewall State (*)<br> 1 (local) 10.206.15.1 Active 2 10.206.15.2 Active | firewall2[admin]# '''cphaprob stat'''<br> Cluster Mode: Sync only (IPSO cluster)<br> Number Unique Address Firewall State (*)<br> 1 10.206.15.1 Down 2 (local) 10.206.15.2 Active |} '''Symptom 2:''' sync packets are sent and received in on direction only as seen in the incrementing stats {| cellspacing="5" border="1" ! Firewall #1 ! Firewall #2 |- | firewall1[admin]# '''fw ctl pstat | grep -A 1 "Sync p" | awk '{print $1,$2,$3}'''' Sync packets sent: total : 196731, Sync packets received: total : 17342 firewall1[admin]# '''fw ctl pstat | grep -A 1 "Sync p" | awk '{print $1,$2,$3}'''' Sync packets sent: total : 196819, Sync packets received: total : 17382 | firewall2[admin]# '''fw ctl pstat | grep -A 1 "Sync p" | awk '{print $1,$2,$3}'''' Sync packets sent: total : 970, Sync packets received: total : 6, '''<<< not incrementing''' firewall2[admin]# '''fw ctl pstat | grep -A 1 "Sync p" | awk '{print $1,$2,$3}' ''' Sync packets sent: total : 1050, Sync packets received: total : 6, '''<<< not incrementing''' |} == Root Cause == possible mismatch between sychonization broadcast/multicast modes {| cellspacing="5" border="1" ! Firewall #1 ! Firewall #2 |- | firewall1[admin]# '''cphaprob -a if'''<br> eth1c0 non sync(non secured) eth2c0 non sync(non secured) eth4c0 sync(secured), multicast | firewall2[admin]# '''cphaprob -a if'''<br> eth1c0 non sync(non secured) eth2c0 non sync(non secured) eth4c0 sync(secured), broadcast |} == Solution: == Reset the sync mode on the firewall who's sync packets aren't being received successfully firewall1 [admin]# '''cphaconf set_ccp broadcast''' this should resolve the down status and sync sent / received issues {| cellspacing="5" border="1" ! Firewall #1 ! Firewall #2 |- | firewall1[admin]# '''cphaprob stat'''<br> Cluster Mode: Sync only (IPSO cluster)<br> Number Unique Address Firewall State (*)<br> 1 (local) 10.206.15.1 Active 2 10.206.15.2 Active | firewall2[admin]# '''cphaprob stat'''<br> Cluster Mode: Sync only (IPSO cluster)<br> Number Unique Address Firewall State (*)<br> 1 10.206.15.1 Active 2 (local) 10.206.15.2 Active |} [[category:check point]] Cphaprob stat active / attention status 0 31 35 2013-02-27T18:30:47Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == problem description == ClusterXL shows Active Attention / Interface Active Check Error Vendor Check Point Platform SPLAT Version R65 NGX Firewalls - Checkpoint Tuesday, 23 February 2010 13:21 Share on emailShare on printShare on deliciousShare on twitterShare on diggShare on stumbleuponShare on facebook This article will provide the required troubleshooting steps for resolving the issue of the "Interface Active Check" error within ClusterXL. First of all you spot there is an error within ClusterXL using the following command, root@firewall # '''cphaprob stat'''<br> Cluster Mode: Legacy High Availability (Active Up)<br> Number Unique Address Assigned Load State<br> 192.168.12.1 100% active attention (local) 192.168.12.2 0% down Confirming the issue To pinpoint which part of the ClusterXL Check Point is not happy with run the following command. (This will list all the ClusterXL components and there status`s) 01.root@firewall # cphaprob list 02. 03.Built-in Devices: 04. 05.Device Name: Interface Active Check 06.'''Current state: problem''' 07. 08.Registered Devices: 09. 10.Device Name: Synchronization 11.Registration number: 0 12.Timeout: none 13.Current state: OK 14.Time since last report: 241598 sec 15. 16.Device Name: Filter 17.Registration number: 1 18.Timeout: none 19.Current state: OK 20.Time since last report: 241598 sec 21. 22.Device Name: fwd 23.Registration number: 2 24.Timeout: 2 sec 25.Current state: OK 26.Time since last report: 1 sec 27. 28.Device Name: cphad 29.Registration number: 3 30.Timeout: 2 sec 31.Current state: OK 32.Time since last report: 1 sec From this you can see that the issue is based on the Interface Checking, 1.Device Name: Interface Active Check 2.Current state: problem Checking the Monitored Interfaces Now that we see the error we will need to look a bit closer at the state of the interfaces: 01.root@firewall # cphaprob -a if 02.Required interfaces: 6 03.Required secured interfaces: 1 04. 05.eth4 UP sync(secured), unique, multicast 06.eth0 UP non sync(non secured), shared, multicast 07.eth1 Inbound: DOWN (241522 secs) Outbound: DOWN (241523 secs) non sync(non secured), shared, multicast 08.eth10 UP non sync(non secured), shared, multicast 09.eth11 Disconnected non sync(non secured), unique, broadcast 10.eth2 UP non sync(non secured), unique, multicast 11.eth3 UP non sync(non secured), shared, multicast We can see here that eth1 is still being monitored but is showing as down. When I connect to the other cluster node I see that eth1 is also showing down. == Solution == So in order to ensure that Check Point completely ignores this interface we will need to add this interface to the file "$FWDIR/conf/discntd.if". Below shows you how the file should look once we add eth1 to it. 1.root@firewall # cat $FWDIR/conf/discntd.if 2.eth1 3.eth11 Once you have changed this file on both nodes, re-push the policy and the ClusterXL status should be back to Active/Standy and the output of "cphaprob list" should show no errors. If it appears that this hasnt resolved the issue run a `cphaprob -a if` and confirm that this interface is now showing as disconnected. If the output of `cphaprob stat` is still not showing active/standby run a `cpstop && cpstart` on each node which then should resolve the problem. This occurred on R75.40 splat. Was fixed after a reboot of each node. [[category:check point]] Cpinfo for cma or mds on provider-1 0 2 519 518 2014-07-22T14:54:35Z Nighthawk 1 wikitext text/x-wiki == CMA cpinfo == To generate a cpinfo for the Provider-1/ SiteManager-1 CMA or MDS, proceed as follows. To collect cpinfo from the relevant CMA that manages the Security Gateway : Login to the MDS as "superuser". Look at the list of all Customers (CMAs) by running: mdsstat Set the environment for the Customer by running: mdsenv <customer_name> For example, for the Customer "test" the syntax is: mdsenv test (This sets the environment specifically for the Customer "test", a setting that is different from the MDS environment settings.) Verify the correct environment by running: echo $FWDIR This displays the correct path for the CMA. For example, the response will be: /opt/CPmds-R65/customers/<customer_name>/CPsuite-R65/fw1/ Collect cpinfo by using exactly this syntax: cpinfo -c <cma_name> -z -n -o /var/cma.cpinfo Please send Check Point Support this file: /var/cma.cpinfo.gz == MDS cpinfo== Log into the MDS as "superuser". Set the environment for the entire MDS by running: mdsenv Verify the correct environment by running: echo $FWDIR For example, the response will be: /opt/CPmds-R65/ Collect cpinfo: cpinfo -z -n -o /var/mds.cpinfo Please send Check Point Support this file: /var/mds.cpinfo.gz [[category:cpinfo]] 518 3 2014-07-22T14:54:20Z Nighthawk 1 wikitext text/x-wiki == SOLUTION == To generate a cpinfo for the Provider-1/ SiteManager-1 CMA or MDS, proceed as follows. To collect cpinfo from the relevant CMA that manages the Security Gateway : Login to the MDS as "superuser". Look at the list of all Customers (CMAs) by running: mdsstat Set the environment for the Customer by running: mdsenv <customer_name> For example, for the Customer "test" the syntax is: mdsenv test (This sets the environment specifically for the Customer "test", a setting that is different from the MDS environment settings.) Verify the correct environment by running: echo $FWDIR This displays the correct path for the CMA. For example, the response will be: /opt/CPmds-R65/customers/<customer_name>/CPsuite-R65/fw1/ Collect cpinfo by using exactly this syntax: cpinfo -c <cma_name> -z -n -o /var/cma.cpinfo Please send Check Point Support this file: /var/cma.cpinfo.gz == MDS cpinfo== Log into the MDS as "superuser". Set the environment for the entire MDS by running: mdsenv Verify the correct environment by running: echo $FWDIR For example, the response will be: /opt/CPmds-R65/ Collect cpinfo: cpinfo -z -n -o /var/mds.cpinfo Please send Check Point Support this file: /var/mds.cpinfo.gz [[category:cpinfo]] 3 2 2013-02-25T21:56:43Z Nighthawk 1 wikitext text/x-wiki == SOLUTION == To generate a cpinfo for the Provider-1/ SiteManager-1 CMA or MDS, proceed as follows. To collect cpinfo from the relevant CMA that manages the Security Gateway : Login to the MDS as "superuser". Look at the list of all Customers (CMAs) by running: mdsstat Set the environment for the Customer by running: mdsenv <customer_name> For example, for the Customer "test" the syntax is: mdsenv test (This sets the environment specifically for the Customer "test", a setting that is different from the MDS environment settings.) Verify the correct environment by running: echo $FWDIR This displays the correct path for the CMA. For example, the response will be: /opt/CPmds-R65/customers/<customer_name>/CPsuite-R65/fw1/ Collect cpinfo by using exactly this syntax: cpinfo -c <cma_name> -z -n -o /var/cma.cpinfo Please send Check Point Support this file: /var/cma.cpinfo.gz To collect cpinfo from the MDS Log into the MDS as "superuser". Set the environment for the entire MDS by running: mdsenv Verify the correct environment by running: echo $FWDIR For example, the response will be: /opt/CPmds-R65/ Collect cpinfo: cpinfo -z -n -o /var/mds.cpinfo Please send Check Point Support this file: /var/mds.cpinfo.gz [[category:cpinfo]] 2 2013-02-25T21:55:34Z Nighthawk 1 Created page with "SOLUTION To generate a cpinfo for the Provider-1/ SiteManager-1 CMA or MDS, proceed as follows. To collect cpinfo from the relevant CMA that manages the Security Gateway : ..." wikitext text/x-wiki SOLUTION To generate a cpinfo for the Provider-1/ SiteManager-1 CMA or MDS, proceed as follows. To collect cpinfo from the relevant CMA that manages the Security Gateway : Login to the MDS as "superuser". Look at the list of all Customers (CMAs) by running: mdsstat Set the environment for the Customer by running: mdsenv <customer_name> For example, for the Customer "test" the syntax is: mdsenv test (This sets the environment specifically for the Customer "test", a setting that is different from the MDS environment settings.) Verify the correct environment by running: echo $FWDIR This displays the correct path for the CMA. For example, the response will be: /opt/CPmds-R65/customers/<customer_name>/CPsuite-R65/fw1/ Collect cpinfo by using exactly this syntax: cpinfo -c <cma_name> -z -n -o /var/cma.cpinfo Please send Check Point Support this file: /var/cma.cpinfo.gz To collect cpinfo from the MDS Log into the MDS as "superuser". Set the environment for the entire MDS by running: mdsenv Verify the correct environment by running: echo $FWDIR For example, the response will be: /opt/CPmds-R65/ Collect cpinfo: cpinfo -z -n -o /var/mds.cpinfo Please send Check Point Support this file: /var/mds.cpinfo.gz [[category:cpinfo]] Creating calculate GB in one days of logs for MLM 0 219 694 693 2017-10-03T16:11:41Z Nighthawk 1 wikitext text/x-wiki to get log quantity for the last 24 hours(in GB on R77)... mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done | awk '{s+=$1} END {print s}' get logs in GB per day for the last 7 days(R77)... for CLM in *; do mdsenv $CLM; echo $CLM; for DAY in 1 2 3 4 5 6 7; do find $CLM/CPsuite-R77/fw1/log/*.log -mtime +`echo $DAY` -a -mtime -`expr $DAY + 2` | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done; done [[category:mlm]] [[category:logging]] 74905f517dca52a553d74da7377db2227ad410ad 693 692 2017-10-03T15:45:02Z Nighthawk 1 wikitext text/x-wiki to get log quantity for the last 24 hours(in GB)... mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done | awk '{s+=$1} END {print s}' [[category:mlm]] [[category:logging]] 199045a79a024652ab2054308f9f81cf570c318a 692 691 2017-10-03T15:44:50Z Nighthawk 1 wikitext text/x-wiki to get log quantity for the last 24 hours... mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done | awk '{s+=$1} END {print s}' [[category:mlm]] [[category:logging]] e6580e683593053603348c8ea0efda3c76739028 691 690 2017-10-03T15:44:41Z Nighthawk 1 wikitext text/x-wiki to get log quantity for the last 24 hours... mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done | awk '{s+=$1} END {print s}' 64.5209 [[category:mlm]] [[category:logging]] 96bd6a93ffb546da815fc38ad7917bf3851df7c3 690 2017-10-03T15:43:59Z Nighthawk 1 Created page with " mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | b..." wikitext text/x-wiki mcd customers # for CLM in *; do mdsenv $CLM; find $CLM/CPsuite-R77/fw1/log/*.log -mtime -1 | xargs ls -l | awk '{s+=$5} END {printf "%.0f", s; print "/1024/1024/1024"}' | bc -l; done | awk '{s+=$1} END {print s}' 64.5209 [[category:mlm]] [[category:logging]] 6cf9fdb3a98fbc36e4764d12f38825c5f4f9ea8b Creating objects with dbedit 0 26 30 2013-02-26T00:28:33Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == creating a new host == dbedit> create host_plain ''object_name'' dbedit> modify network_objects ''object_name'' ipaddr 192.168.1.1 dbedit> update network_objects ''object_name'' == creating a new network == dbedit> create network ''network_name'' dbedit> modify network_objects ''network_name'' ipaddr 192.168.1.0 dbedit> modify network_objects ''network_name'' netmask 255.255.255.0 dbedit> update network_objects ''network_name'' == creating and adding objects to a group == dbedit> create network_object_group ''group_name'' dbedit> addelement network_objects ''group_name'' '' network_objects:''object_name'' dbedit> update network_objects ''group_name'' == deleting an object == dbedit> delete network_objects <object_name> == running the script == dbedit -s 192.168.2.100 -u Administrator -p abc123 -f network_script.txt [[category:check point]] Database version manipulation via command line CLI 0 10 11 2013-02-25T22:11:43Z Nighthawk 1 Created page with "== creating a new database version == dbver -s 192.168.1.100 -u username -w my_password -m create version_name`/bin/date +"_%m-%d-%Y-%s"` comments_here == print all existin..." wikitext text/x-wiki == creating a new database version == dbver -s 192.168.1.100 -u username -w my_password -m create version_name`/bin/date +"_%m-%d-%Y-%s"` comments_here == print all existing database versions == dbver -s 192.168.1.100 -u username -w my_password -m print_all [[category:dbver]] Debug fwm on provider-1 mds 0 39 208 44 2013-08-27T03:03:20Z Nighthawk 1 wikitext text/x-wiki When the fwm failed to start after and mdsstart... Type| Name | IP address | FWM | FWD | CPD | CPCA | MDS | 171.186.108.253 | down | down | up 1265 | N/R | Then to start the mds level fwm and get debug messages on std out... fwm -d mds [[category:check point]] 44 2013-03-29T04:05:42Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki When the fwm failed to start after and mdsstart... Type| Name | IP address | FWM | FWD | CPD | CPCA | MDS | 171.186.108.253 | down | down | up 1265 | N/R | Then to start the mds level fwm and get debug messages on std out... fwm -d mds [[category:check point]] Fw ctl zdebug command reference 0 37 42 2013-03-26T20:33:50Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki example: fw ctl zdebug drop|grep ''ip_address'' [[category:check point]] Fw monitor 0 42 161 160 2013-07-07T15:49:23Z Nighthawk 1 wikitext text/x-wiki '''4 chain, all bidirectional traffic between 2 hosts''' fw monitor -m iIoO -e "accept src=192.168.1.1 and dst=10.0.0.1; accept src=10.0.0.1 and dst=192.168.0.1;" '''capture icmp packets only from host x''' fw monitor -m iIoO -e "ip_p=1,host(192.168.1.1), accept;" Usual Capture Capture everything, save the data into the file: [Expert@HostName]# fw monitor -e "accept;" -o /var/log/fw_mon.cap Capture everything between host X and host Y: [Expert@HostName]# fw monitor -e "((src=x.x.x.x , dst=y.y.y.y) or (src=y.y.y.y , dst=x.x.x.x)), accept;" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "host(x.x.x.x) and host(y.y.y.y), accept;" -o /var/log/fw_mon.cap Capture everything between hosts X,Z and hosts Y,Z on all Check Point kernel chains: [Expert@HostName]# fw monitor -p all -e "((src=x.x.x.x or dst=z.z.z.z) and (src=y.y.y.y or dst=z.z.z.z)), accept ;" -o /var/log/fw_mon.cap Capture everything to/from host X or to/from host Y or to/from host Z: [Expert@HostName]# fw monitor -e "((accept (src=x.x.x.x or dst=x.x.x.x)) or (accept (src=y.y.y.y or dst=y.y.y.y)) or (accept (src=z.z.z.z or dst=z.z.z.z)));" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "host(x.x.x.x) or host(=y.y.y.y) or host(=z.z.z.z), accept;" -o /var/log/fw_mon.cap Port Specific Capture Capture everything to/from port X: [Expert@HostName]# fw monitor -e "accept (sport=x or dport=x);" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "port(x), accept;" -o /var/log/fw_mon.cap Capture everything except port X: [Expert@HostName]# fw monitor -e "accept not (sport=x or dport=x);" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "((sport=!x) or (dport=!x)), accept;" -o /var/log/fw_mon.cap Capture everything except SSH: [Expert@HostName]# fw monitor -e "accept not (sport=22 or dport=22);" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "((sport!=22) or (dport!=22)), accept;" -o /var/log/fw_mon.cap Capture everything to/from host X except SSH: [Expert@HostName]# fw monitor -e "((accept (src=x.x.x.x or dst=x.x.x.x)) and (accept not (sport=22 or dport=22)));" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "((host(x.x.x.x) and (sport!=22 or dport!=22)), accept;" -o /var/log/fw_mon.cap Protocol Specific Capture Note: Protocol number in the syntax has to be provided in Decimal format. Refer to '/etc/protocols' file on the machine, or to 'www.iana.org/assignments/protocol-numbers/' Capture everything on protocol X: [Expert@HostName]# fw monitor -e "ip_p=X, accept;" -o /var/log/fw_mon.cap Everything on protocol X and port Z on protocol Y: [Expert@HostName]# fw monitor -e "(ip_p=X) or (ip_p=Y, port(Z)), accept;" -o /var/log/fw_mon.cap Capture everything TCP between host X and host Y: [Expert@HostName]# fw monitor -e "ip_p=6, host(x.x.x.x) or host(=y.y.y.y), accept;" -o /var/log/fw_mon.cap [Expert@HostName]# fw monitor -e "accept [9:1]=9 , ((src=x.x.x.x , dst=y.y.y.y) or (src=y.y.y.y , dst=x.x.x.x));" [Expert@HostName]# fw monitor -e "ip_p=6, ((src=x.x.x.x , dst=y.y.y.y) or (src=y.y.y.y , dst=x.x.x.x)), accept;" -o /var/log/fw_mon.cap Bytes Specific Capture Simple checks are used to check for a value at a specific offset in the packet: [Expert@HostName]# fw monitor -e "accept [ offset : length , order ] relational-operator value;" Field Explanation offset specifies the offset relative to the beginning of the IP packet from where the value should be read. length specifies the number of bytes and can be 1 (byte), 2 (word), or 4 (dword). If length is not specified, 'FW Monitor' assumes 4 (dword). order specifies the byte order. Possible values are b (big endian), or l (little endian, or host order). If order is not specified, 'FW Monitor' assumes little endian byte order. relational-operator is a relational operator to express the relation between the packet data and the value: < less than > greater than <= less than or equal to >= greater than = or is equal to != or is not not equal to value is one of the data types known to INSPECT (e.g., an IP address, or an integer). The IP-based protocols are stored in the IP packet as a byte at offset 9: To filter based on a Protocol encapsulated into IP, use "accept [9:1]=Protocol_Number_in_Decimal_format;" syntax The Layer 3 IP Addresses are stored in the IP packet as double words at offset 12 (Source address) and at offset 16 (Destination address): To filter based on a Source IP address, use "accept [12:4,b]=IP_Address_in_Doted_Decimal_format;" syntax To filter based on a Destination IP address, use "accept [16:4,b]=IP_Address_in_Doted_Decimal_format;" syntax The Layer 4 Ports are stored in the IP packet as a word at offset 20 (Source port) and at offset 22 (Destination port): To filter based on a Source port, use "accept [20:2,b]=Port_Number_in_Decimal_format;" syntax To filter based on a Destination port, use "accept [22:2,b]=Port_Number_in_Decimal_format;" syntax Capture everything between host X and host Y: [Expert@HostName]# fw monitor -e "accept (([12:4,b]=x.x.x.x , [16:4,b]=y.y.y.y) or ([12:4,b]=y.y.y.y , [16:4,b]=x.x.x.x));" Capture everything on port X: [Expert@HostName]# fw monitor -e "accept [20:2,b]=x or [22:2,b]=x;" -o /var/log/fw_mon.cap Network Specific Capture Capture everything on network 192.168.33.0/24: [Expert@HostName]# fw monitor -e "net={<192.168.33.0,192.168.33.255>}; dst in net, accept;" Examples Capture ESP protocol or UDP port 161 (SNMP): [Expert@HostName]# fw monitor -e "(ip_p=50) or (ip_p=17, port(161)), accept;" -o /var/log/fw_mon.cap > /dev/null 2>&1 & Filter out the usual garbage (SMTP, POP3, SSH, Microsoft NetBIOS, Check Point ClusterXL CCP): [Expert@HostName]# fw monitor -e "(sport!=25) and (dport!=25) and (sport!=110) and (dport!=110) and (sport!=22) and (dport!=22) and (sport!=137) and (dport!=137) and (sport!=8116) and (dport!=8116), accept;" -o /var/log/fw_mon.cap > /dev/null 2>&1 & Filter out the usual garbage (filter in only TCP protocol, and HTTP and HTTPS ports ; filter out the SSH and FW Logs): [Expert@HostName]# fw monitor -e "accept (ip_p=6) and (not (sport=22 or dport=22)) and (not (sport=257 or dport=257)) and ((dport=80 or dport=443) or (sport=80 or sport=443);" -o /var/log/fw_mon.cap > /dev/null 2>&1 & Capture Edge communication on UDP ports 9281, 9282, 9283: [Expert@HostName]# fw monitor -e "ip_p=17, (host(10.10.10.10) or host(20.20.20.20) or host(30.30.30.30)) and (port(9281) or port(9282) or port(9283)), accept;" -o /var/log/fw_mon.cap [[category:check point]] 160 47 2013-07-06T19:30:32Z Nighthawk 1 wikitext text/x-wiki '''4 chain, all bidirectional traffic between 2 hosts''' fw monitor -m iIoO -e "accept src=192.168.1.1 and dst=10.0.0.1; accept src=10.0.0.1 and dst=192.168.0.1;" '''capture icmp packets only from host x''' fw monitor -m iIoO -e "ip_p=1,host(192.168.1.1), accept;" [[category:check point]] 47 2013-04-12T15:37:29Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki '''4 chain, all bidirectional traffic between 2 hosts''' fw monitor -m iIoO -e "accept src=192.168.1.1 and dst=10.0.0.1; accept src=10.0.0.1 and dst=192.168.0.1;" [[category:check point]] Fwd restart via CLI 0 11 314 313 2013-11-15T23:09:24Z Nighthawk 1 wikitext text/x-wiki == Problem== 1) A firewall is logging locally. Symptoms will include: A) No new logs are coming into the SmartCenter or CLM according to the SmartViewTracker or fw log command B) The $FWDIR/log/fw.log file is increasing in size on the firewall in question 2) There is not TCP log connection between the firewall fwd process and the log server / SmartCenter / CLM. You should normally see an ESTABLISHED connection when running the following command on a firewall that is configured to log remotely. [Expert@chkpfw]# '''netstat -anp | grep ":257" | grep -v -E "LISTEN|127.0.0.1"''' tcp 0 0 172.16.0.254:48956 192.168.1.100:257 ESTABLISHED 31856/fwd where 172.16.0.254 = local firewall address and 192.168.1.100 = remote log server address == Solution == 1) Make sure fwd is running on the SmartCenter or other logger and that there is free disk space. 2) Restart fwd on the firewall(s). '''command line fwd restart''' '''start command''' # cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" '''stop command''' # cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -command "fwd" [[category:logging]] 313 12 2013-11-15T22:53:16Z Nighthawk 1 ! wikitext text/x-wiki == Problem== 1) A firewall is logging locally. If a firewall is logging locally, then... A) No new logs are coming into the SmartCenter or CLM according to the SmartViewTracker or fw log command B) The $FWDIR/log/fw.log file is increasing in size on the firewall in question 2) There is not TCP log connection between the firewall fwd process and the log server / SmartCenter / CLM. You should normally see an ESTABLISHED connection when running the following command on a firewall that is configured to log remotely. [Expert@chkpfw]# '''netstat -an | grep ":257" | grep -v -E "LISTEN|127.0.0.1"''' tcp 0 0 172.16.0.254:48956 192.168.1.100:257 ESTABLISHED == Solution == == command line fwd restart == == stop/start commands == # cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" # cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -command "fwd" [[category:logging]] 12 2013-02-25T22:12:53Z Nighthawk 1 Created page with "command line fwd restart == stop/start commands == cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -..." wikitext text/x-wiki command line fwd restart == stop/start commands == cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -command "fwd" Gaia VRRP setup guide 0 118 572 272 2016-02-18T01:59:22Z Nighthawk 1 /* Proxy arps */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.11''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.11''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust(is switching over from CPHA) the config to match the new VRRP MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address == Failover == To control which firewall is master, adjust the priorities. In the beginning we set chkpfw1 priority to 100, and chkpfw2 to 95. If we elevate the priority of the latter, it will become master. Example: chkpfw2> set mcvr vrid 100 priority 105 If you want to leave it that way and have it survive a reboot, you will have to also run a "save config" [[category:vrrp]] [[category:gaia]] 272 271 2013-09-15T10:04:19Z Nighthawk 1 /* create VRID and backup-addresses */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.11''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.11''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address == Failover == To control which firewall is master, adjust the priorities. In the beginning we set chkpfw1 priority to 100, and chkpfw2 to 95. If we elevate the priority of the latter, it will become master. Example: chkpfw2> set mcvr vrid 100 priority 105 If you want to leave it that way and have it survive a reboot, you will have to also run a "save config" [[category:vrrp]] [[category:gaia]] 271 270 2013-09-15T09:24:48Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address == Failover == To control which firewall is master, adjust the priorities. In the beginning we set chkpfw1 priority to 100, and chkpfw2 to 95. If we elevate the priority of the latter, it will become master. Example: chkpfw2> set mcvr vrid 100 priority 105 If you want to leave it that way and have it survive a reboot, you will have to also run a "save config" [[category:vrrp]] [[category:gaia]] 270 269 2013-09-15T09:13:10Z Nighthawk 1 /* Failover */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address == Failover == To control which firewall is master, adjust the priorities. In the beginning we set chkpfw1 priority to 100, and chkpfw2 to 95. If we elevate the priority of the latter, it will become master. Example: chkpfw2> set mcvr vrid 100 priority 105 If you want to leave it that way and have it survive a reboot, you will have to also run a "save config" [[category:vrrp]] [[category:gaia]] 269 268 2013-09-15T09:12:02Z Nighthawk 1 wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address == Failover == To control which firewall is master, adjust the priorities. In the beginning we set chkpfw1 priority to 100, and chkpfw2 to 95. If we elevate the priority of the latter, it will become master. Example: chkpfw2> set mcvr vrid 100 priority 105 [[category:vrrp]] [[category:gaia]] 268 267 2013-09-15T09:06:22Z Nighthawk 1 /* create VRID and backup-addresses */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config. The commands run are basically the same except for the priority. {| cellspacing="5" border="1" |- | Expert@chkpfw1]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' | Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' |- |- |} == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 267 266 2013-09-15T09:04:23Z Nighthawk 1 /* create VRID and backup-addresses */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 100 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 266 265 2013-09-15T08:47:50Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 265 264 2013-09-15T08:47:32Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" ! | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 264 263 2013-09-15T08:47:05Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" align="left" ! | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 263 261 2013-09-15T08:46:07Z Nighthawk 1 /* from clish prompt, create vrid, add backup-addresses, save config */ wikitext text/x-wiki == create VRID and backup-addresses == from clish prompt, create vrid, add backup-addresses, save config Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" ! align="left" | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 261 260 2013-09-15T08:44:40Z Nighthawk 1 moved [[gaia vrrp setup using CLI]] to [[Gaia VRRP setup guide]] wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" ! align="left" | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 260 259 2013-09-15T08:44:04Z Nighthawk 1 wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.175.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Proxy arps == If you have NATs with associated proxy arps, then you will need to adjust this to match the new VRRP configuration. VRRP by default uses a multicast MAC. Most likely, if you are upgrading from SPLAT and CPHA, your proxy arps were using unicast MACs. The VMAC will be 00:00:5e:00:01:xx, where xx = the hexadecimal form of you VRID. So, in this example our VRID is 100, so the VMAC is 00:00:5e:00:01:64. You can view this by running... [Expert@chkpfw1]# '''clish -c "show vrrp interfaces" | grep -i vmac''' VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 VMAC Mode: VRRP VMAC: 00:00:5e:00:01:64 == Checking your configuration == {| cellspacing="5" border="1" ! align="left" | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 259 258 2013-09-15T08:34:40Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left" | ! |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 258 257 2013-09-15T08:34:13Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 257 256 2013-09-15T08:34:02Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 256 255 2013-09-15T08:33:45Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 255 254 2013-09-15T08:33:22Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# '''clish -c "show vrrp summary"''' VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 254 253 2013-09-15T08:33:11Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 | [Expert@chkpfw2]# clish -c "show vrrp summary" VRRP State VRRP Router State: Up Flags: On,MonitorFirewall Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 2 In Master state 0 |- |- |} Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 253 252 2013-09-15T08:31:09Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount |- | [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 |row 1, col 2 |- |- |} [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 252 251 2013-09-15T08:30:47Z Nighthawk 1 /* Checking your configuration */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == {| cellspacing="5" border="1" ! align="left"|Item ! Amount ! Cost |- |row 1, col 1 |row 1, col 2 |- |- |} [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 251 250 2013-09-15T08:28:27Z Nighthawk 1 /* configure cluster object */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 250 249 2013-09-15T08:28:15Z Nighthawk 1 /* configure cluster object */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == If upgrading from SecurePlatform, you will need to set the O.S. verions. When you do this, the "ClusterXL" option on the left side will expand to read "ClusterXL and VRRP" [[file:chkp_vrrp_cluster_config-1.png]] Select VRRP as your HA method. Also, I like to enable the "Forward Cluster Incoming traffic..." option. Otherwise you cannot ping your VRRP backup / cluster IPs to see if they are working. [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 249 239 2013-09-15T08:22:15Z Nighthawk 1 /* configure cluster object */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config-1.png]] [[file:chkp_vrrp_cluster_config-1.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 239 238 2013-09-13T21:46:25Z Nighthawk 1 /* Add rule to allow vrrp adverstisements */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] == Checking your configuration == [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Also, you cannot ping the backup-addresses in Gaia like you could in ipso. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 238 237 2013-09-13T21:45:00Z Nighthawk 1 /* Add rule to allow vrrp adverstisements */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] '''Checking your configuration''' [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 237 236 2013-09-13T21:40:13Z Nighthawk 1 wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] '''Checking your configuration''' [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Verify your vrrp backup address is in effect. It will NOT show up in ifconfig output. Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 236 235 2013-09-13T21:37:51Z Nighthawk 1 wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] '''Checking your configuration''' [Expert@chkpfw1]# '''clish -c "show vrrp summary"''' <br>VRRP State VRRP Router State: Up Flags: On Interface enabled: 2 Virtual routers configured: 2 In Init state 0 In Backup state 0 In Master state 2 Expert@chkpfw1]# '''ip addr show eth0''' 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000 link/ether 00:0c:29:d8:3e:56 brd ff:ff:ff:ff:ff:ff inet 172.16.31.9/28 brd 172.16.31.15 scope global eth0 inet 172.16.31.11/28 brd 172.16.31.15 scope global secondary flags 10 eth0 <<< this line is the vrrp backup-address [[category:vrrp]] [[category:gaia]] 235 234 2013-09-13T21:17:58Z Nighthawk 1 wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# '''clish''' chkpfw2> '''add mcvr vrid 100 priority 95 priority-delta 10''' chkpfw2> '''add mcvr vrid 100 backup-address 172.16.31.1''' chkpfw2> '''add mcvr vrid 100 backup-address 192.168.1.1''' chkpfw2> '''save config''' == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] [[category:vrrp]] [[category:gaia]] 234 233 2013-09-13T21:17:34Z Nighthawk 1 /* create vrid, add backup-addresses, save config */ wikitext text/x-wiki == from clish prompt, create vrid, add backup-addresses, save config == Expert@chkpfw2]# clish chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] [[category:vrrp]] [[category:gaia]] 233 232 2013-09-13T21:17:02Z Nighthawk 1 wikitext text/x-wiki == create vrid, add backup-addresses, save config == chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config == configure cluster object == [[file:chkp_vrrp_cluster_config.png]] == Add rule to allow vrrp adverstisements == Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] [[category:vrrp]] [[category:gaia]] 232 230 2013-09-13T21:16:35Z Nighthawk 1 wikitext text/x-wiki create vrid, add backup-addresses, save config chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config configure cluster object [[file:chkp_vrrp_cluster_config.png]] Add rule to allow vrrp adverstisements. Failure to do so will cause master/master status. [[file:chkp_vrrp_rule.png]] [[category:vrrp]] [[category:gaia]] 230 228 2013-09-13T21:15:51Z Nighthawk 1 wikitext text/x-wiki create vrid, add backup-addresses, save config chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config configure cluster object [[file:chkp_vrrp_cluster_config.png]] Add rule to allow vrrp adverstisements. Failure to do so will cause master/master status. [[category:vrrp]] [[category:gaia]] 228 227 2013-09-13T21:05:40Z Nighthawk 1 moved [[gaia vrrp]] to [[gaia vrrp setup using CLI]] wikitext text/x-wiki create vrid, add backup-addresses, save config chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config configure cluster object [[file:chkp_vrrp_cluster_config.png]] [[category:vrrp]] [[category:gaia]] 227 225 2013-09-13T17:38:15Z Nighthawk 1 wikitext text/x-wiki create vrid, add backup-addresses, save config chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config configure cluster object [[file:chkp_vrrp_cluster_config.png]] [[category:vrrp]] [[category:gaia]] 225 224 2013-09-13T17:35:15Z Nighthawk 1 wikitext text/x-wiki chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config [[file:chkp_vrrp_cluster_config.png]] [[category:vrrp]] [[category:gaia]] 224 223 2013-09-13T17:34:42Z Nighthawk 1 wikitext text/x-wiki chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config [file:chkp_vrrp_cluster_config.png] [[category:vrrp]] [[category:gaia]] 223 2013-09-13T17:10:30Z Nighthawk 1 Created page with " chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpf..." wikitext text/x-wiki chkpfw2> add mcvr vrid 100 priority 95 priority-delta 10 chkpfw2> add mcvr vrid 100 backup-address 172.16.31.1 chkpfw2> add mcvr vrid 100 backup-address 192.168.1.1 chkpfw2> save config [[category:vrrp]] [[category:gaia]] Gaia clish config example 0 203 612 2017-02-15T16:56:11Z Nighthawk 1 Created page with " set interface eth1-05 ipv4-address 192.168.253.1 mask-length 24 set interface eth1-05 link-speed 1000M/full" wikitext text/x-wiki set interface eth1-05 ipv4-address 192.168.253.1 mask-length 24 set interface eth1-05 link-speed 1000M/full 8a3607b21d08e6bc31c0fa9b20096a688a76b7ba Get Provider-1 CMA / Mgmt HA synchronization status from the CLI 0 3 467 466 2014-05-20T15:15:33Z Nighthawk 1 moved [[Get Provider-1 CMA synchronization status from the CLI]] to [[Get Provider-1 CMA / Mgmt HA synchronization status from the CLI]] wikitext text/x-wiki == How to retrieve CMA sync status from the CLI == taken from: Solution ID: sk66069 Product: Multi-Domain Management / Provider-1 Version: R75.10 == Solution == 1. Log in to the Primary MDS 2. Run the "mdsenv <Primary-CMA>" command. 3. Run the command with the Secondary CMA as the parameter: # '''cpmistat -o schema -r mg <Secondary-CMA> | grep "mgSyncStatus"''' :mgSyncStatus (Lagging) [[category:provider-1]] 466 4 2014-05-20T15:13:50Z Nighthawk 1 /* Changing the HA status of the Management station from command line */ wikitext text/x-wiki == How to retrieve CMA sync status from the CLI == taken from: Solution ID: sk66069 Product: Multi-Domain Management / Provider-1 Version: R75.10 == Solution == 1. Log in to the Primary MDS 2. Run the "mdsenv <Primary-CMA>" command. 3. Run the command with the Secondary CMA as the parameter: # '''cpmistat -o schema -r mg <Secondary-CMA> | grep "mgSyncStatus"''' :mgSyncStatus (Lagging) [[category:provider-1]] 4 2013-02-25T21:58:32Z Nighthawk 1 Created page with "== How to retrieve CMA sync status from the CLI == taken from: Solution ID: sk66069 Product: Multi-Domain Management / Provider-1 Version: R75.10 == Solution == ..." wikitext text/x-wiki == How to retrieve CMA sync status from the CLI == taken from: Solution ID: sk66069 Product: Multi-Domain Management / Provider-1 Version: R75.10 == Solution == 1. Log in to the Primary MDS 2. Run the "mdsenv <Primary-CMA>" command. 3. Run the command with the Secondary CMA as the parameter: # '''cpmistat -o schema -r mg <Secondary-CMA> | grep "mgSyncStatus"''' :mgSyncStatus (Lagging) == Changing the HA status of the Management station from command line == Solution ID: sk34495 Product: Security Gateway, Multi-Domain Management / Provider-1, SecurePlatform Version: NGX R65, R70, R71, R75 check current status (0 = Standby / 1 = Active) # cpprod_util FwIsActiveManagement Set CMA / Management station to Standby status *** use if primary / secondary CMAs are in active / active state # cpprod_util FwSetActiveManagement 0 Set CMA / Management station to Active status # cpprod_util FwSetActiveManagement 1 [[category:monitoring]] How to add NATs and ARPs on Gaia with VRRP 0 165 456 2014-05-12T19:02:07Z Nighthawk 1 Created page with " == add NAT rules == Step 1 - Add automatic or manual static NATs in the ruleset as normal. == configuring proxy ARP == Automatic arp is not compatible with firewalls using..." wikitext text/x-wiki == add NAT rules == Step 1 - Add automatic or manual static NATs in the ruleset as normal. == configuring proxy ARP == Automatic arp is not compatible with firewalls using VRRP for HA. This is because Automatic arp is meant for CPHA or standalone firewalls. It publishes unicast MACs, whereas VRRP operates with multicast MACs. Step 2 - Disable Automatic ARP in your policy (global properties, NAT) if it isn't already 2) Set up manual proxy ARPs for all your NAT IPs. Use the VRRP MAC for these. configure manual proxy ARPs on Gaia by adding an entry to the file '''/etc/fw/conf/local.arp''' where the entry format is nat_ip vrrp_mac firewall_unicast_interface_ip example entry 192.168.100.100 00:00:5e:00:01:0A 192.168.100.1 the proxy arp will take effect upon the next policy installation == Determining you firewall's VRRP MAC == [Expert@mygaiafw]# clish -c "show vrrp interfaces" | grep -m 1 VMAC VMAC Mode: VRRP VMAC: '''00:00:5e:00:01:0a''' so 00:00:5e:00:01:0a is the VRRP MAC or VMAC. It is determined by the formula... VMAC = 00:00:5e:00:01:XX, where XX = your VRRP VRID in HEX == verifying proxy arps == to make sure the firewall is publishing your newly added proxy arp, run... # '''fw ctl arp''' you should see the new entry in the output [[category:vrrp]] How to determine SIC Certificate expiration date 0 43 48 2013-04-12T15:43:38Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki How to determine SIC Certificate expiration date Solution ID: sk62873 Product: SecurePlatform Version: R70, R71, R75 OS: SecurePlatform, SecurePlatform 2.6, Windows Platform: All Last Modified: 11-Aug-2011 Did this solution solve your problem? [Click on the stars to rate] Solution If you want to determine the SIC Certificate Expiration date you can view your certificates by running the following command via the management server: [Expert@mgmt]# '''cpca_client lscert''' **NOTE: This command only works on R65 HFA50 and above. ======================================================= EXAMPLE OUTPUT: Operation succeeded. rc=0. 4 certs found. Subject = CN=mgmt,O=mgmt..bbqdkc Status = Valid Kind = SIC Serial = 37748 DP = 0 Not_Before: Sun Apr 3 09:50:11 2011 Not_After: Sat Apr 2 09:50:11 2016 Subject = CN=cp_mgmt,O=mgmt..bbqdkc Status = Valid Kind = SIC Serial = 42070 DP = 0 Not_Before: Sun Apr 3 09:50:06 2011 Not_After: Sat Apr 2 09:50:06 2016 Subject = CN=gw,O=mgmt..bbqdkc Status = Valid Kind = SIC Serial = 10659 DP = 0 Not_Before: Wed Apr 20 23:42:35 2011 Not_After: Tue Apr 19 23:42:35 2016 Subject = CN=gw,O=mgmt..bbqdkc Status = Revoked Kind = SIC Serial = 8013 DP = 0 Not_Before: Sun Apr 3 10:28:55 2011 Not_After: Sat Apr 2 10:28:55 2016 ======================================================= The output can be further filtered using the following optional switches together with the lscert option. [-stat Pending|Valid|Revoked|Expired|Renewed] and [-kind SIC|IKE|User|LDAP] A SIC Cert is valid for 5 years from creation(true in older check point versions?) [[category:check point solutions]] Howto mount an iso on linux 0 40 45 2013-03-29T15:03:58Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki mount -o loop iso_filename.iso /mnt/cdrom [[category:linux]] IPSO csh interactive while loop example 0 106 320 192 2013-12-09T18:59:40Z Nighthawk 1 wikitext text/x-wiki ip390[admin]# '''while ( 1 ) ; ps -auxwww | grep xpand ; sleep 1 ;''' while? '''end''' # '''while ( $i < 100 ) ; ping -c 1 -W 1 192.168.1.$i | grep time ; @ i++ ;''' while? '''end''' [[category:sysadmin]] 192 191 2013-07-19T18:18:00Z Nighthawk 1 moved [[IPSO while loop example]] to [[IPSO csh interactive while loop example]] wikitext text/x-wiki ip390[admin]# '''while ( 1 ) ; ps -auxwww | grep xpand ; sleep 1 ;''' while? '''end''' [[category:sysadmin]] 191 2013-07-19T18:17:34Z Nighthawk 1 Created page with " ip390[admin]# '''while ( 1 ) ; ps -auxwww | grep xpand ; sleep 1 ;''' while? '''end''' [[category:sysadmin]]" wikitext text/x-wiki ip390[admin]# '''while ( 1 ) ; ps -auxwww | grep xpand ; sleep 1 ;''' while? '''end''' [[category:sysadmin]] Ip130 0 44 49 2013-04-12T15:48:45Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki http://wiki.openwrt.org/toh/nokia/ip130 Installing a new hard disk into a Nokia IP130 http://augerking.blogspot.com/2005/10/installing-new-hard-disk-into-nokia.html Juniper junos olive reference 0 68 97 2013-05-17T15:32:14Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki initial prompt after olive / junos 8.5R4.3 installation root@% to enter cli root@% '''cli''' then you get a new prompt... root> to enter configuration mode: root> '''configure''' Entering configuration mode [edit] root# <<< ''new pound prompt'' set root user password root# '''set system login user joost authentication plain-text-password''' New password: Retype new password: [edit] root# '''set system login user joost class super-user''' [edit] set interface ip address root# '''set interfaces em0 unit 0 family inet address 192.168.0.200/24''' [edit] commit your changes and test the new interface that should be working now root# '''commit and-quit''' commit complete Exiting configuration mode root> '''ping 192.168.0.1''' PING 192.168.0.1 (192.168.0.1): 56 data bytes 64 bytes from 192.168.0.1: icmp_seq=0 ttl=64 time=8.197 ms 64 bytes from 192.168.0.1: icmp_seq=1 ttl=64 time=1.927 ms 64 bytes from 192.168.0.1: icmp_seq=2 ttl=64 time=0.648 ms 64 bytes from 192.168.0.1: icmp_seq=3 ttl=64 time=0.168 ms to enable ssh service for incoming management connections user@host# '''set system services ssh''' [edit] root# '''commit and-quit''' commit complete [[category:juniper]] MDS script to check CMA sync status via command line 0 7 8 2013-02-25T22:09:58Z Nighthawk 1 Created page with "here it am... and it is portable. works on R65 to R75. #!/bin/bash source /opt/CPshared/5.0/tmp/.CPprofile.sh MDS_HOSTNAME=`hostname` MDS_BASE_IP=`cpmiquerybin attr "mds..." wikitext text/x-wiki here it am... and it is portable. works on R65 to R75. #!/bin/bash source /opt/CPshared/5.0/tmp/.CPprofile.sh MDS_HOSTNAME=`hostname` MDS_BASE_IP=`cpmiquerybin attr "mdsdb" mdss "" -a __name__,ipaddr | grep -i $MDS_HOSTNAME | awk '{print $2}'` echo "mds hostname = $MDS_HOSTNAME" echo "mds base ip = $MDS_BASE_IP" MDS_CMA_LIST=( `cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__ | awk -F "_._._" '{printf $1 " " }'` ) MDS_CMA_LIST_LEN=${#MDS_CMA_LIST[@]} # get array length MDS_CMA_LIST_LEN=$(($MDS_CMA_LIST_LEN)) printf "%-35s%-35s%8s%1s%-8s%15s\n" CMA-1 CMA-2 Status / Status Sync_Status printf "%-35s%-35s%8s%1s%-8s%15s\n" ---------------------------------- ---------------------------------- -------- - -------- -------------- for a in `seq $MDS_CMA_LIST_LEN` do mdsenv ${MDS_CMA_LIST[$a-1]} # subtract 1 because array keys start @ zero LOCAL_CMA=( `cpmiquerybin attr "" network_objects "management='true'" -a __name__ | awk '{printf $1 " "}'` ) CMA_1_STATUS=`cpmistat -o schema -r mg ${LOCAL_CMA[0]} | grep mgActiveStatus | awk '{print $2}'` CMA_2_STATUS=`cpmistat -o schema -r mg ${LOCAL_CMA[1]} | grep mgActiveStatus | awk '{print $2}'` CMA_1_SYNC_STATUS=`cpmistat -o schema -r mg ${LOCAL_CMA[0]} | grep "mgSyncStatus" | grep -v "N/R" | awk '{print $2}'` CMA_2_SYNC_STATUS=`cpmistat -o schema -r mg ${LOCAL_CMA[1]} | grep "mgSyncStatus" | grep -v "N/R" | awk '{print $2}'` printf "%-35s%-35s%8s%1s%-8s%15s\n" ${LOCAL_CMA[0]} ${LOCAL_CMA[1]} $CMA_1_STATUS / $CMA_2_STATUS $CMA_1_SYNC_STATUS $CMA_2_SYNC_STATUS done [[category:scripts]] MLM logcheck script 0 38 43 2013-03-27T22:13:34Z Nighthawk 1 Created page with "This is a simple logcheck script to identify logs older that 20 days. The output can be piped to a script for compression. #!/bin/sh # source $CPDIR/tmp/.CPprofile.sh RE..." wikitext text/x-wiki This is a simple logcheck script to identify logs older that 20 days. The output can be piped to a script for compression. #!/bin/sh # source $CPDIR/tmp/.CPprofile.sh RETENTION=20 CPSUITE_DIR=`echo $MDS_TEMPLATE | awk -F "/" '{print $3}'` # mdsenv mcd customers for CLM in * do find $CLM/$CPSUITE_DIR/fw1/log/*.log -mtime +$RETENTION | grep -v fwui.log done [[category:logs]] Main Page 0 1 823 377 2018-08-13T12:45:19Z Nighthawk 1 /* Admin Quick Links */ wikitext text/x-wiki '''Welcome to cpwikinet!''' == create new user account == new users signup via [http://www.cpwiki.net/index.php?title=Special:UserLogin&type=signup Login / Signup] Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] * [https://en.wikipedia.org/wiki/Help:Wikitext_quick_reference Wiki markup] == Admin Quick Links == [http://www.cpwiki.net/index.php/cpmiquerybin cpmiquerybin] [http://www.cpwiki.net/index.php?title=MediaWiki:Sidebar&action=edit Sidebar] [http://www.cpwiki.net/index.php/r80_api_reference API Reference] == Uploading files? Click the link below. == * [http://www.cpwiki.net/index.php/Special:Upload Click here to upload a file] 45a8a77b9ffc684c1dc81ce12c4dd2d185f874c4 377 84 2014-03-15T20:45:52Z Nighthawk 1 /* Admin Quick Links */ wikitext text/x-wiki '''Welcome to cpwikinet!''' == create new user account == new users signup via [http://www.cpwiki.net/index.php?title=Special:UserLogin&type=signup Login / Signup] Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] * [https://en.wikipedia.org/wiki/Help:Wikitext_quick_reference Wiki markup] == Admin Quick Links == [http://www.cpwiki.net/index.php/cpmiquerybin cpmiquerybin] [http://www.cpwiki.net/index.php?title=MediaWiki:Sidebar&action=edit Sidebar] == Uploading files? Click the link below. == * [http://www.cpwiki.net/index.php/Special:Upload Click here to upload a file] 84 81 2013-04-28T01:13:53Z Nighthawk 1 wikitext text/x-wiki '''Welcome to cpwikinet!''' == create new user account == new users signup via [http://www.cpwiki.net/index.php?title=Special:UserLogin&type=signup Login / Signup] Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] * [https://en.wikipedia.org/wiki/Help:Wikitext_quick_reference Wiki markup] == Admin Quick Links == [http://www.cpwiki.net/index.php/Cpmiquerybin Cpmiquerybin] [http://www.cpwiki.net/index.php?title=MediaWiki:Sidebar&action=edit Sidebar] == Uploading files? Click the link below. == * [http://www.cpwiki.net/index.php/Special:Upload Click here to upload a file] 81 1 2013-04-26T17:46:55Z Nighthawk 1 wikitext text/x-wiki '''Welcome to cpwikinet!''' == create new user account == new users signup via [http://www.cpwiki.net/index.php?title=Special:UserLogin&type=signup Login / Signup] Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] * [https://en.wikipedia.org/wiki/Help:Wikitext_quick_reference Wiki markup] == Admin Quick Links == [http://www.cpwiki.net/index.php?title=MediaWiki:Sidebar&action=edit Sidebar] == Uploading files? Click the link below. == * [http://www.cpwiki.net/index.php/Special:Upload Click here to upload a file] 1 2013-02-25T21:50:21Z MediaWiki default 0 wikitext text/x-wiki '''MediaWiki has been successfully installed.''' Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] Management High Availability Synchronizaton failure 0 75 115 114 2013-05-21T07:09:13Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync is successful, the cpca on the secondary cma should start on its own. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''up 21785''' | Problem solved. [[category:check point]] [[category:smartcenter]] 114 113 2013-05-21T07:08:44Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''up 21785''' | Problem solved. [[category:check point]] [[category:smartcenter]] 113 112 2013-05-21T07:08:10Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''up 21785''' | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | [[category:check point]] [[category:smartcenter]] 112 111 2013-05-21T07:06:47Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''up 21785''' | [[category:check point]] [[category:smartcenter]] 111 110 2013-05-21T07:05:55Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''up 21785''' | [[category:check point]] [[category:smartcenter]] 110 109 2013-05-21T07:04:20Z Nighthawk 1 /* Problem description */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 192.168.1.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 192.168.1.2 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. 109 108 2013-05-21T07:03:30Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 171.178.7.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 171.155.44.74 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. '''One the primary cma''' # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. 108 107 2013-05-21T07:02:29Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 171.178.7.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 171.155.44.74 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. [['''One the primary cma''']] # stop cma # mdsenv cma-primary # rm $FWDIR/conf/mgha/* # start cma # Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. 107 106 2013-05-21T07:01:22Z Nighthawk 1 wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true '''cma-secondary false''' * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 171.178.7.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 171.155.44.74 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. One the primary cma... 1. stop cma 2. mdsenv cma-primary 3. rm $FWDIR/conf/mgha/* 4. start cma 5. Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. 106 2013-05-21T07:00:51Z Nighthawk 1 Created page with " == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receiv..." wikitext text/x-wiki == Problem description == * Management HA is failing to sync the secondary CMA via SmartDashboard > Policy > Management High Availability * Error message: "Failed to receive current status. Reason: 'Management High Availability feature is not enabled. [[file: chkp_mgmt_ha_sync_error.png]] * The smart_center_backup parameter in the objects_5_0.C is false when it should be true [Expert@provider-1]# mdsenv cma-primary [Expert@provider-1]# cpmiquerybin attr "" network_objects "management='true'" -a __name__,smart_center_backup cma-primary true cma-secondary false * The secondary CMA is newly created and has never been synchronized. Synchronization during the CMA creating failed. * Error messages from cpca.elg of the secondary cma: main: could not initiate the Certificate Authority. No Certificate Authority existing * The cpca process on the secondary CMA is down and fails to start. [Expert@provider-1]# mdsstat | +-----+----------------+-----------------+------------+----------+----------+----------+ | Type| Name | IP address | FWM | FWD | CPD | CPCA | +-----+----------------+-----------------+------------+----------+----------+----------+ | MDS | - | 171.178.7.1 | up 3421 | up 3420 | up 3419 | up 3956 | +-----+----------------+-----------------+------------+----------+----------+----------+ | CMA | cma-primary | 171.155.44.74 | up 21716 | up 21715 | up 21705 | '''down''' | == Solution == * <p>Change the smart_center_backup parameter to true using dbedit, gui-dbedit or by editing the objects_5_0.C file. One the primary cma... 1. stop cma 2. mdsenv cma-primary 3. rm $FWDIR/conf/mgha/* 4. start cma 5. Manually synchronized the secondary via SmartDashboard > Policy > Management HighAvailability After the sync was successful, the cpca on the secondary cma should start on its own. Maximum concurrent connection and firewall memory 0 151 420 2014-04-17T00:12:46Z Nighthawk 1 Created page with " Check Point firewall versions: All currently supported (R65-R77 as of this posting) <table border="1" cellspacing="4" cellpadding="4"> <tr> <td><strong>Concurrent connection..." wikitext text/x-wiki Check Point firewall versions: All currently supported (R65-R77 as of this posting) <table border="1" cellspacing="4" cellpadding="4"> <tr> <td><strong>Concurrent connections limit</strong></td> <td><strong>Hash size (bytes)</strong></td> <td><strong>Mem. Pool (MB)</strong></td> <td><strong>Max. Mem. Pool (MB)</strong></td> </tr> <tr> <td style="text-align: center;">0-21000</td> <td style="text-align: center;">65536</td> <td style="text-align: center;">6-8</td> <td style="text-align: center;">24-33</td> </tr> <tr> <td style="text-align: center;">22000-43000</td> <td style="text-align: center;">131072</td> <td style="text-align: center;">8-17</td> <td style="text-align: center;">35-68</td> </tr> <tr> <td style="text-align: center;">44000-87000</td> <td style="text-align: center;">262144</td> <td style="text-align: center;">17-34</td> <td style="text-align: center;">70-139</td> </tr> <tr> <td style="text-align: center;">88000-174000</td> <td style="text-align: center;">524288</td> <td style="text-align: center;">35-69</td> <td style="text-align: center;">140-278</td> </tr> <tr> <td style="text-align: center;">175000-349000</td> <td style="text-align: center;">1048576</td> <td style="text-align: center;">70-139</td> <td style="text-align: center;">280-559</td> </tr> <tr> <td style="text-align: center;">350000-699000</td> <td style="text-align: center;">2097152</td> <td style="text-align: center;">140-279</td> <td style="text-align: center;">560-1119</td> </tr> <tr> <td style="text-align: center;">700000-1398000</td> <td style="text-align: center;">4194304</td> <td style="text-align: center;">280-559</td> <td style="text-align: center;">1121-2047</td> </tr> </table> As an example, for a maximum concurrent connections limit of 725000, an automatic calculation of connections hash table size and memory pool would result in the following: Connections hash table size: 4194304 Memory pool size: 290 MB Maximum memory pool size: 1161 MB Msdquerydb provider-1 command line query tool 0 45 50 2013-04-12T15:56:24Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki mdsquerydb Provider-1 Command-Line Database Query Tool Usage: mdsquerydb key_name [-f output_file_name] Currently running in MDS environment. Keys for MDS environment: ------------------------- GlobalNetworkObjects # Get name and type of all global network objects NetworkObjects # Get all customers' internal Check Point installed network objects Customers # Get names of all PV-1 Customers Administrators # Get names of all PV-1 Administrators MDSs # Get names and IPs of all MDSs CMAs # Get names of all CMAs GuiClients # Get names and IPs of all gui clients Keys for CMA environment: ------------------------- NetworkObjects # Get name and type of all network objects Gateways # Get names and IPs of all gateways get list of firewalls (check point objects no counting CMAs) mdsquerydb NetworkObjects|grep -v cma|awk -F _ '{print $1}'> firewalls.txt [[category:check point]] New IPSO package Installation guide 0 46 51 2013-04-12T15:58:30Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Solution ID: sk40592 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk40592&js_peid=P-114a7bc3b09-10006&partition=General&product=IPSO, [[category:check point]] Nighthawk's check point / firewall command scratch pad 0 50 284 282 2013-10-24T04:26:08Z Nighthawk 1 /* misc crap */ wikitext text/x-wiki == model number == == equivalent of linux ip route get == iclid >sh route dest 192.168.1.1 == get IP appliance model number (ipso 6.x and above) == clish -c "show asset hardware" | grep Platform | awk '{print $2}' == mds crap == run on p-1 after upgrade w/name change mdsquerydb NetworkObjects |grep firewall-name search CLMs for last gzipped log for CLM in *; do ls -lt $CLM/CPsuite-R75.20/fw1/log/*.log.gz | grep -m 1 log.gz; done == misc crap == nokias in /etc/hosts on authric cat /etc/hosts | grep -v eth | awk '{print $2}' | grep '^k...' |more ping test 0 / 1 after waiting 2 seconds ping -q -c 1 -W 2 host | grep received | awk -F "," '{print $2}' | awk '{print $1}' get count of sync packets sent on a remote firewall via ssh ssh -q -l admin firewallhostname "fw ctl pstat | grep -A 1 \"Sync packets sent\" | grep total" | awk '{print $3}' | awk -F , '{print $1}' [[category:nokia]] 282 55 2013-10-10T00:59:05Z Nighthawk 1 /* misc crap */ wikitext text/x-wiki == model number == == equivalent of linux ip route get == iclid >sh route dest 192.168.1.1 == get IP appliance model number (ipso 6.x and above) == clish -c "show asset hardware" | grep Platform | awk '{print $2}' == mds crap == run on p-1 after upgrade w/name change mdsquerydb NetworkObjects |grep firewall-name search CLMs for last gzipped log for CLM in *; do ls -lt $CLM/CPsuite-R75.20/fw1/log/*.log.gz | grep -m 1 log.gz; done == misc crap == '''bootmgr upgrade cmds''' '''ipso 6.x''' upgrade_bootmgr /var/emhome/admin/nkipflash-6.2-GA029a02.bin '''ipso 4.1(needs device parameter)''' to check boot device number... ipsctl kern:bootmgr:bmdev upgrade_bootmgr /dev/wd1 /var/emhome/admin/nkipflash-6.2-GA029a02.bin nokias in /etc/hosts on authric cat /etc/hosts | grep -v eth | awk '{print $2}' | grep '^k...' |more ping test 0 / 1 after waiting 2 seconds ping -q -c 1 -W 2 host | grep received | awk -F "," '{print $2}' | awk '{print $1}' get count of sync packets sent on a remote firewall via ssh ssh -q -l admin firewallhostname "fw ctl pstat | grep -A 1 \"Sync packets sent\" | grep total" | awk '{print $3}' | awk -F , '{print $1}' [[category:nokia]] 55 2013-04-12T16:11:58Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == model number == == equivalent of linux ip route get == iclid >sh route dest 192.168.1.1 == get IP appliance model number (ipso 6.x and above) == clish -c "show asset hardware" | grep Platform | awk '{print $2}' == mds crap == run on p-1 after upgrade w/name change mdsquerydb NetworkObjects |grep firewall-name search CLMs for last gzipped log for CLM in *; do ls -lt $CLM/CPsuite-R75.20/fw1/log/*.log.gz | grep -m 1 log.gz; done == misc crap == '''bootmgr upgrade cmds''' '''ipso 4.1??''' upgrade_bootmgr /var/emhome/admin/nkipflash-6.2-GA029a02.bin '''ipso 6.x?? (needs device parameter)''' upgrade_bootmgr /dev/wd1 /var/emhome/admin/nkipflash-6.2-GA029a02.bin nokias in /etc/hosts on authric cat /etc/hosts | grep -v eth | awk '{print $2}' | grep '^k...' |more ping test 0 / 1 after waiting 2 seconds ping -q -c 1 -W 2 host | grep received | awk -F "," '{print $2}' | awk '{print $1}' get count of sync packets sent on a remote firewall via ssh ssh -q -l admin firewallhostname "fw ctl pstat | grep -A 1 \"Sync packets sent\" | grep total" | awk '{print $3}' | awk -F , '{print $1}' [[category:nokia]] Nighthawk's scratch pad 0 4 559 5 2015-08-25T16:11:15Z Nighthawk 1 wikitext text/x-wiki run custom cma_sync_check script with filter /usr/local/bin/cma_sync_stat |grep -E "Lagging|Advanced|Collision|(active)/(active)" format output of custom getpps script for firewall monitoring tail -f /var/tmp/getpps_*_out.csv | awk -F "," '{print $1 ", " $5,"pck/sec ,",$6,"new ierrs ,",$7,"drop rate ,","cpu core idle times:",$9 ",","fw conns=",$10}' [[category:nighthawk]] 5 2013-02-25T22:03:48Z Nighthawk 1 Created page with "run custom cma_sync_check script with filter /usr/local/bin/cma_sync_stat |grep -E "Lagging|Advanced|Collision|(active)/(active)" [[category:nighthawk]]" wikitext text/x-wiki run custom cma_sync_check script with filter /usr/local/bin/cma_sync_stat |grep -E "Lagging|Advanced|Collision|(active)/(active)" [[category:nighthawk]] Nokia / freebsb memory utilization calculation 0 91 145 2013-05-24T15:41:17Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == Formula == % utilization = used memory / total = total – available / total = hw.physmem – ((vm.stats.vm.v_inactive_count * hw.pagesize) + (vm.stats.vm.v_cache_count * hw.pagesize) + (vm.stats.vm.v_free_count * hw.pagesize)) / hw.physmem == commands to gather memory data == sysctl -a | grep vm.stats.vm.v_inactive_count sysctl -a | grep vm.stats.vm.v_cache_count sysctl -a | grep vm.stats.vm.v_free_count sysctl -a | grep hw.pagesize sysctl -a | grep hw.physmem == Links == http://www.cyberciti.biz/files/scripts/freebsd-memory.pl.txt [[category:nokia]] Nokia IPSO clish config example 0 29 611 451 2017-02-15T16:55:21Z Nighthawk 1 Nighthawk moved page [[Nokia clish config example]] to [[Nokia IPSO clish config example]] without leaving a redirect wikitext text/x-wiki <br>clish -c "set interface eth1 active on" <br>clish -c "set interface eth1 duplex full" <br>clish -c "set interface eth1 speed 1000M" <br>clish -c "add interface eth1c0 address 10.0.0.2/28" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 10.0.0.1" <br>clish -c "set interface eth-s1p2 active on" <br>clish -c "set interface eth-s1p2 duplex full" <br>clish -c "set interface eth-s1p2 speed 1000M" <br>clish -c "add interface eth-s1p2 vlanid 100" <<< this creates logical interface named eth-s1p2c1 <br>clish -c "add interface eth-s1p2c1 address 192.168.1.2/27" <br>clish -c "add interface eth-s1p2 vlanid 200" <br>clish -c "add interface eth-s1p2c2 address 192.168.100.2/27" <br>clish -c "add mcvr vrid 10 backup-address 192.168.1.1" <br>clish -c "add mcvr vrid 10 backup-address 192.168.100.1" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" <br>clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 192.168.1.10 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" <br>clish -c "set vrrp monitor-firewall off" <br>clish -c "set vrrp coldstart-delay 90" <br>clish -c "save config" [[category:nokia]] 451 450 2014-05-11T03:58:23Z Nighthawk 1 wikitext text/x-wiki <br>clish -c "set interface eth1 active on" <br>clish -c "set interface eth1 duplex full" <br>clish -c "set interface eth1 speed 1000M" <br>clish -c "add interface eth1c0 address 10.0.0.2/28" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 10.0.0.1" <br>clish -c "set interface eth-s1p2 active on" <br>clish -c "set interface eth-s1p2 duplex full" <br>clish -c "set interface eth-s1p2 speed 1000M" <br>clish -c "add interface eth-s1p2 vlanid 100" <<< this creates logical interface named eth-s1p2c1 <br>clish -c "add interface eth-s1p2c1 address 192.168.1.2/27" <br>clish -c "add interface eth-s1p2 vlanid 200" <br>clish -c "add interface eth-s1p2c2 address 192.168.100.2/27" <br>clish -c "add mcvr vrid 10 backup-address 192.168.1.1" <br>clish -c "add mcvr vrid 10 backup-address 192.168.100.1" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" <br>clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 192.168.1.10 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" <br>clish -c "set vrrp monitor-firewall off" <br>clish -c "set vrrp coldstart-delay 90" <br>clish -c "save config" [[category:nokia]] 450 449 2014-05-11T03:56:23Z Nighthawk 1 wikitext text/x-wiki <br>clish -c "set interface eth1 active on" <br>clish -c "set interface eth1 duplex full" <br>clish -c "set interface eth1 speed 1000M" <br>clish -c "add interface eth1c0 address 10.0.0.2/28" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 10.0.0.1" <br>clish -c "set interface eth-s1p2 active on" <br>clish -c "set interface eth-s1p2 duplex full" <br>clish -c "set interface eth-s1p2 speed 1000M" <br>clish -c "add interface eth-s1p2 vlanid 100" <<< this creates logical interface named eth-s1p2c1 <br>clish -c "add interface eth-s1p2c1 address 192.168.1.2/27" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 192.168.1.1" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" <br>clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 192.168.1.10 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" <br>clish -c "set vrrp monitor-firewall off" <br>clish -c "set vrrp coldstart-delay 90" <br>clish -c "save config" [[category:nokia]] 449 448 2014-05-11T03:55:30Z Nighthawk 1 wikitext text/x-wiki <br>clish -c "set interface eth1 active on" <br>clish -c "set interface eth1 duplex full" <br>clish -c "set interface eth1 speed 1000M" <br>clish -c "add interface eth1c0 address 10.0.0.2/28" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 10.0.0.1" <br>clish -c "set interface eth-s1p2 active on" <br>clish -c "set interface eth-s1p2 duplex full" <br>clish -c "set interface eth-s1p2 speed 1000M" <br>clish -c "add interface eth-s1p2 vlanid 100" <<< this creates logical interface named eth-s1p2c1 <br>clish -c "add interface eth-s1p2c1 address 192.168.1.2/27" <br>clish -c "set mcvr vrid 10 priority 95" <br>clish -c "set mcvr vrid 10 priority-delta 10" <br>clish -c "add mcvr vrid 10 backup-address 192.168.1.1" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" <br>clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 192.168.1.10 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" <br>clish -c "set vrrp monitor-firewall off" <br>clish -c "set vrrp coldstart-delay 90" <br>clish -c "save config" [[category:nokia]] 448 319 2014-05-11T03:42:32Z Nighthawk 1 wikitext text/x-wiki clish -c "set interface eth-s1p1 active on" clish -c "set interface eth-s1p1 duplex full" clish -c "set interface eth-s1p1 speed 1000M" clish -c "add interface eth-s1p1c0 address 10.4.16.1/30" clish -c "set interface eth-s1p2 active on" clish -c "set interface eth-s1p2 duplex full" clish -c "set interface eth-s1p2 speed 1000M" clish -c "add interface eth-s1p2 vlanid 100" <<< this creates logical interface named eth-s1p2c1 clish -c "add interface eth-s1p2c1 address 192.168.1.1/27" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 192.168.1.1.75" clish -c "set interface eth1 active on" clish -c "set interface eth1 duplex full" clish -c "set interface eth1 speed 1000M" clish -c "set interface eth1c0 logical-name eth1c0" clish -c "add interface eth1c0 address 10.0.0.9/28" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 10.0.0.9" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 171.161.228.129 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" clish -c "set vrrp monitor-firewall off" clish -c "set vrrp coldstart-delay 90" clish -c "save config" [[category:nokia]] 319 33 2013-12-03T19:21:00Z Nighthawk 1 wikitext text/x-wiki clish -c "set interface eth-s1p1 active on" clish -c "set interface eth-s1p1 duplex full" clish -c "set interface eth-s1p1 speed 1000M" clish -c "set interface eth-s1p1c0 logical-name eth-s1p1c0" clish -c "add interface eth-s1p1c0 address 10.4.16.1/30" clish -c "set interface eth-s1p2 active on" clish -c "set interface eth-s1p2 duplex full" clish -c "set interface eth-s1p2 speed 1000M" clish -c "set interface eth-s1p2c0 logical-name eth-s1p2c0" clish -c "add interface eth-s1p2c0 address 192.168.1.1/27" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 192.168.1.1.75" clish -c "set interface eth1 active on" clish -c "set interface eth1 duplex full" clish -c "set interface eth1 speed 1000M" clish -c "set interface eth1c0 logical-name eth1c0" clish -c "add interface eth1c0 address 10.0.0.9/28" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 10.0.0.9" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "add arpproxy address 171.161.228.129 macaddress 00:00:5e:00:01:69" clish -c "set vrrp accept-connections on" clish -c "set vrrp monitor-firewall off" clish -c "set vrrp coldstart-delay 90" clish -c "save config" [[category:nokia]] 33 2013-02-26T01:56:29Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki clish -c "set interface eth-s1p1 active on" clish -c "set interface eth-s1p1 duplex full" clish -c "set interface eth-s1p1 speed 1000M" clish -c "set interface eth-s1p1c0 logical-name eth-s1p1c0" clish -c "add interface eth-s1p1c0 address 10.4.16.1/30" clish -c "set interface eth-s1p2 active on" clish -c "set interface eth-s1p2 duplex full" clish -c "set interface eth-s1p2 speed 1000M" clish -c "set interface eth-s1p2c0 logical-name eth-s1p2c0" clish -c "add interface eth-s1p2c0 address 192.168.1.1/27" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 192.168.1.1.75" clish -c "set interface eth1 active on" clish -c "set interface eth1 duplex full" clish -c "set interface eth1 speed 1000M" clish -c "set interface eth1c0 logical-name eth1c0" clish -c "add interface eth1c0 address 10.0.0.9/28" clish -c "set mcvr vrid 10 priority 95" clish -c "set mcvr vrid 10 priority-delta 10" clish -c "add mcvr vrid 10 backup-address 10.0.0.9" echo "adding routes" clish -c "set static-route default nexthop gateway address 10.0.0.1 priority 1 on" clish -c "set static-route 10.124.0.0/15 nexthop gateway address 10.0.0.1 on" clish -c "set vrrp accept-connections on" clish -c "set vrrp monitor-firewall off" clish -c "set vrrp coldstart-delay 90" clish -c "save config" [[category:nokia]] Nokia boot failed due to raid mirror 0 69 547 542 2015-01-07T20:39:20Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: '''degraded, enabled, resync in progress''' Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. The raid will likely show degraded and resync in progress, but it is usable during the resync. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. 1) Determine the name of the disk device. This varies by platform. BOOTMGR[2]> '''sysinfo''' CPU 0: 2793 MHz Intel(R) Xeon(TM) CPU 2.80GHz Memory: 2100350976 (2004M bytes) Disk Devices: IO port 0x1f0 adc0: unit 0 (ad0): <STI Flash 8.0.0> 1024MB (2001888 sectors), 1986 cyls, 16 heads, 63 S/T IO port 0x6088 adc2: unit 0 ('''ad4'''): <FUJITSU MHY2080BS> 80026MB (156301488 sectors), 16383 cyls, 16 heads, 63 S/T 2) Enter maintenance shell BOOTMGR[5]> '''sh''' This command should result in a new # prompt. 3) Check mac address in the raid label # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d 4) Check hardware mac address # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 5) compare the mac_addr_base to the macbase above. if mis-matched, then relabel... '''relabel volume metadata''' # '''gmirror deactivate gmroots1 ad4s1''' (It’s OK if this command returns an error) # '''gmirror clear ad4s1''' # '''gmirror label –v –n –b round-robin gmroots1 ad4s1''' system should now boot! == links == taken from [http://dl3.checkpoint.com/paid/43/RAID.pdf?HashKey=1411187746_b3e9208e053682b1d5b208df8b23cf82&xtn=.pdf raid.doc] [[category:nokia]] 542 541 2014-10-02T07:23:59Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: '''degraded, enabled, resync in progress''' Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. The raid will likely show degraded and resync in progress, but it is usable during the resync. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. Enter maintenance shell BOOTMGR[5]> '''sh''' Check mac address in the raid label # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d Check hardware mac address # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 compare the mac_addr_base to the macbase above. if mis-matched, then relabel... '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' system should now boot! == links == taken from [http://dl3.checkpoint.com/paid/43/RAID.pdf?HashKey=1411187746_b3e9208e053682b1d5b208df8b23cf82&xtn=.pdf raid.doc] [[category:nokia]] 541 540 2014-10-02T06:18:13Z Nighthawk 1 /* activate raid volume */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: '''degraded, enabled, resync in progress''' Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. The raid will likely show degraded and resync in progress, but it is usable during the resync. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase below, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' system should now boot! == links == taken from [http://dl3.checkpoint.com/paid/43/RAID.pdf?HashKey=1411187746_b3e9208e053682b1d5b208df8b23cf82&xtn=.pdf raid.doc] [[category:nokia]] 540 539 2014-10-02T06:13:27Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase below, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' system should now boot! == links == taken from [http://dl3.checkpoint.com/paid/43/RAID.pdf?HashKey=1411187746_b3e9208e053682b1d5b208df8b23cf82&xtn=.pdf raid.doc] [[category:nokia]] 539 538 2014-09-20T04:33:10Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 # '''gmirror list''' Geom name: gmroots1 State: COMPLETE Components: 1 Balance: round-robin Slice: 4096 Flags: NOAUTOSYNC GenID: 0 SyncID: 1 ID: 2548360505 Providers: 1. Name: mirror/gmroots1 Mediasize: 79857450496 (74G) Sectorsize: 512 Mode: r0w0e0 Consumers: 1. Name: da0s1 <<<<<<<<<<<<<<<<<<<<< root device Mediasize: 79857451008 (74G) Sectorsize: 512 Mode: r1w1e1 State: ACTIVE Priority: 0 Flags: NONE GenID: 0 SyncID: 1 ID: 1949224550 # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase above, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' system should now boot! == links == taken from [http://dl3.checkpoint.com/paid/43/RAID.pdf?HashKey=1411187746_b3e9208e053682b1d5b208df8b23cf82&xtn=.pdf raid.doc] [[category:nokia]] 538 537 2014-09-20T04:30:24Z Nighthawk 1 /* Problem */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 # '''gmirror list''' Geom name: gmroots1 State: COMPLETE Components: 1 Balance: round-robin Slice: 4096 Flags: NOAUTOSYNC GenID: 0 SyncID: 1 ID: 2548360505 Providers: 1. Name: mirror/gmroots1 Mediasize: 79857450496 (74G) Sectorsize: 512 Mode: r0w0e0 Consumers: 1. Name: da0s1 <<<<<<<<<<<<<<<<<<<<< root device Mediasize: 79857451008 (74G) Sectorsize: 512 Mode: r1w1e1 State: ACTIVE Priority: 0 Flags: NONE GenID: 0 SyncID: 1 ID: 1949224550 # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase above, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' [[category:nokia]] 537 536 2014-09-20T04:30:09Z Nighthawk 1 /* Problem */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 # '''gmirror list''' Geom name: gmroots1 State: COMPLETE Components: 1 Balance: round-robin Slice: 4096 Flags: NOAUTOSYNC GenID: 0 SyncID: 1 ID: 2548360505 Providers: 1. Name: mirror/gmroots1 Mediasize: 79857450496 (74G) Sectorsize: 512 Mode: r0w0e0 Consumers: 1. Name: da0s1 <<<<<<<<<<<<<<<<<<<<< root device Mediasize: 79857451008 (74G) Sectorsize: 512 Mode: r1w1e1 State: ACTIVE Priority: 0 Flags: NONE GenID: 0 SyncID: 1 ID: 1949224550 # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase above, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' [[category:nokia]] 536 535 2014-09-20T04:29:38Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 # '''gmirror list''' Geom name: gmroots1 State: COMPLETE Components: 1 Balance: round-robin Slice: 4096 Flags: NOAUTOSYNC GenID: 0 SyncID: 1 ID: 2548360505 Providers: 1. Name: mirror/gmroots1 Mediasize: 79857450496 (74G) Sectorsize: 512 Mode: r0w0e0 Consumers: 1. Name: da0s1 <<<<<<<<<<<<<<<<<<<<< root device Mediasize: 79857451008 (74G) Sectorsize: 512 Mode: r1w1e1 State: ACTIVE Priority: 0 Flags: NONE GenID: 0 SyncID: 1 ID: 1949224550 # '''gmirror dump da0s1''' Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase above, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' [[category:nokia]] 535 534 2014-09-20T04:29:22Z Nighthawk 1 /* relabel volume metadata (ipso 6.x) */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' A mismatch in the mirror metadata for the macbase will cause the mounting of the root file system to fail. This will be the case when trying to boot off a drive pair from another device. # '''ipsctl -a hw:eeprom:mac_addr_base''' hw:eeprom:mac_addr_base = 0:a0:8e:be:aa:50 # '''gmirror list''' Geom name: gmroots1 State: COMPLETE Components: 1 Balance: round-robin Slice: 4096 Flags: NOAUTOSYNC GenID: 0 SyncID: 1 ID: 2548360505 Providers: 1. Name: mirror/gmroots1 Mediasize: 79857450496 (74G) Sectorsize: 512 Mode: r0w0e0 Consumers: 1. Name: da0s1 <<<<<<<<<<<<<<<<<<<<< root device Mediasize: 79857451008 (74G) Sectorsize: 512 Mode: r1w1e1 State: ACTIVE Priority: 0 Flags: NONE GenID: 0 SyncID: 1 ID: 1949224550 # gmirror dump da0s1 Metadata on da0: magic: GEOM::MIRROR version: 4 name: gmroots1 mid: 2548360505 did: 1949224550 all: 1 genid: 0 syncid: 1 priority: 0 slice: 4096 balance: round-robin mediasize: 79857450496 sectorsize: 512 syncoffset: 0 mflags: NOAUTOSYNC dflags: NONE hcprovider: provsize: 79857451008 macbase: 0 a0 8e c1 97 10 <<<<<<<<<<<<<<<< compare to macbase above, if mis-matched, then relabel... MD5 hash: 7f666d5c5c279faa7fb7a1d42b43555d '''relabel volume metadata''' # '''gmirror deactivate gmroots1 da0s1''' (It’s OK if this command returns an error) # '''gmirror clear da0s1''' # '''gmirror label –v –n –b round-robin gmroots1 da0s1''' [[category:nokia]] 534 533 2014-09-20T03:52:24Z Nighthawk 1 /* activate raid volume */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. If the device O.S. is ipso 4.x, then you are done and it should be ready to boot. If ipso 6.x, continue... === relabel volume metadata (ipso 6.x)=== '''check macbase data for mismatch''' 533 532 2014-09-20T03:04:28Z Nighthawk 1 /* activate raid volume */ wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. 532 98 2014-09-20T03:03:48Z Nighthawk 1 wikitext text/x-wiki ==Problem== Nokia firewall fails to boot off a RAID pair of drives moved from another chassis. This is because the volume is deactivated when moved between systems. '''Errors:''' Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed ==Solution== === activate raid volume === BOOTMGR[1]> '''raid''' -------------------------------------------------------- IPSO LSI Logic Configuration Utility version : Version 0.5, June 8, 2007 -------------------------------------------------------- Adapter Type ............. 3 (SAS Adapter) PCI Device ID ............ 0x0056 Hardware Revision ID ..... 0x0004 Devices in Volume ........ 0 FW Version ............... (01.18.00.00) decimal MPI Version of FW ........ MPI Version 1.5.13.0 -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- Choose an option: '''1''' ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''13''' Volume: [0-1 or RETURN to quit] 0 <br> Volume 0 is being activated <br> Changes made, doing a camcontrol rescan Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle ...... done ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- <br> Choose an option: '''1''' ------------------ Show Volumes ------------------------ 1 volume is active, 2 physical disks are active <br> Volume 0 is Bus 0 Target 0, Type IM (Integrated Mirroring) Volume State: degraded, enabled, resync in progress Volume Settings: write caching enabled, auto configure Volume draws from Hot Spare Pools: 0 Volume Size 76158 MB, Stripe Size 0 KB, 2 Members Primary is PhysDisk 0 (Bus 0 Target 4) Secondary is PhysDisk 1 (Bus 0 Target 1) <br> ------------------- RAID MENU -------------------------- 1) Show volume(s) 2) Show physical disk(s) 3) Get Volume Status <br> Options below available from boot manager ----------------------------------------- 10) Disable volume 11) Enable volume 12) Deactivate volume 13) Activate volume 30) Create RAID Volume 31) Delete RAID Volume q) Main Menu -------------------------------------------------------- Choose an option: '''q''' -------------------------------------------------------- 1) Raid Options Sub-Menu 2) Firmware operations q) EXIT -------------------------------------------------------- <br> Choose an option: '''q''' Re-scan of bus 0 was successful Re-scan of bus 0 was successful Waiting 5 seconds for SCSI devices to settle .. Type 'boot <enter>' to continue boot process .. 98 2013-05-17T15:42:41Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Problem: Errors: Boot manager loaded. Entering autoboot mode. Type any character to enter command mode. Error: /image on /dev/mirror/gmroots1f does not exist or is not a file umount: /mnt: not a file system root directory boot failed Solution: Nokia clish dhcp 0 48 53 2013-04-12T16:00:11Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == enbling dhcp on an interface<br><br> == NokiaIP130:44>add dhcp client interface eth-s3p1c0<br><br> NokiaIP130:44>set dhcp client enable<br><br> NokiaIP130:44>set interface eth-s3p1c0 enable<br><br> == disabling dhcp on an interface== NokiaIP130:44> '''set dhcp client disable'''<br> NokiaIP130:45> '''delete dhcp client interface eth-s1p1c0'''<br> [[category:nokia]] Nokia config lock override 0 92 146 2013-05-24T15:41:42Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki >set config-lock on override [[category:nokia]] Nokia firewall admin password reset 0 70 99 2013-05-17T15:43:06Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki 1- Boot to single user mode BOOTMGR1> boot -s 2- Once the system gets to single user mode, you'll get the prompt: "Enter pathname of shell or RETURN for sh:" Just hit the RETURN key again to get a prompt. 3- At the unix shell prompt, just run the overpw tool to fix the password to a known state by typing: # /etc/overpw 4- Complete the boot, type CTRL-D to exit the single user shell. 5- Once the system finishes booting fully, you can log in to the admin account with your new password [[category:nokia]] Nokia firewall config backups 0 93 301 148 2013-11-05T04:47:33Z Nighthawk 1 /* parsing the backup files */ wikitext text/x-wiki == backing up the firewall config == clish -c "set backup manual filename backup_filename" clish -c "set backup manual on" The backup file will be in /var/backup == parsing the backup files == static routes cat /var/takebackup/config/db/initial |grep static [[category:nokia]] 148 2013-05-24T16:12:03Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == backing up the firewall config == clish -c "set backup manual filename backup_filename" clish -c "set backup manual on" The backup file will be in /var/backup == parsing the backup files == static routes cat var/takebackup/config/db/initial |grep static [[category:nokia]] Nokia firewall disk commands 0 71 100 2013-05-17T15:43:30Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki show disks show disk 0 [[category:nokia]] Nokia firewall hosts file editing 0 30 147 34 2013-05-24T15:43:10Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki You cannot directly edit the hosts file on nokia check point firewalls. adding a new host entry through clish: NokiaIP2450[admin]# clish NokiaIP2450:104> add host name firewall-2450 ipv4 192.168.1.1 NokiaIP2450:104> save config alter existing entry: NokiaIP2450:104> set host name firewall-2450 ipv4 192.168.1.1 delete existing line / entry: NokiaIP2450:104> delete host name firewall-2450 [[category:nokia]] 34 2013-02-27T18:08:17Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki You cannot directly edit the hosts file on nokia check point firewalls. adding a new host entry through clish: firewall-2450[admin]# clish NokiaIP2450:104> add host name dallab-2450 ipv4 192.168.1.1 NokiaIP2450:104> save config alter existing entry: NokiaIP2450:104> set host name dallab-2450 ipv4 192.168.1.1 delete existing line / entry: NokiaIP2450:104> delete host name dallab-2450 [[category:nokia]] Nokia flash to disk conversion 0 51 56 2013-04-12T16:17:45Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki '''How to convert IP390 or IP560 Security Platforms from Flash-Based to Disk-Based Appliances''' https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubmit_doGoviewsolutiondetails=&solutionid=sk41505 '''How to tell if your system is Disk-based, Hybrid, or Flash-only''' Solution ID: sk40435 Product: IP Appliances Version: IP1220, IP1260, IP560, IP390, All Platform: IP1220, IP1260, IP560, IP390 Last Modified: 14-Apr-2009 Did this solution solve your problem? [Click on the stars to rate] '''Solution''' There are two partitions /var and /opt are mounted differently based on the initial system configuration: • for Disk-based systems both the /var and /opt partitions are mounted on the hard disk (wd0) • for Hybrid systems (local Check Point logging on HDD) the /opt partition is mounted on v9fs and the /var partition is mounted on the optional hard disk (wd1) ( this assumes the customer has previously enabled the optional HDD for local logging -- see article 1350934) • for Flash-only systems the /var and /opt partitions are mounted on v9fs ( on-board memory file system) Please use the "df -k" CLI command to verify your configuration as shown in the examples below. These apply to IP390, IP560 and IP12XX. '''Disk-based installation verification information''' -------------------------------------------------------------- TOP[admin]# df -k Filesystem 1K-blocks Used Avail Capacity Mounted on /dev/wd0f 598029 85871 464316 16% / /dev/wd0a 37556 32 34520 0% /config /dev/wd0d 30978766 287029 28213436 1% /var /dev/wd0e 5268700 268396 4578808 6% /opt procfs 4 4 0 100% /proc '''Hybrid Installation verification information''' -------------------------------------------------------- IP560[admin]# df -k Filesystem 1K-blocks Used Avail Capacity Mounted on /dev/wd0f 266383 44080 200993 18% / v9fs 767388 50548 716840 7% /image/IPSO-4.1-BUILD013-03.27.2006-223017-1515/rfs /dev/wd0a 31775 161 29072 1% /config /dev/wd0h 664831 205476 406169 34% /preserve /dev/wd1d 37905549 23674 34849432 0% /var procfs 4 4 0 100% /proc mfs:92 7607 0 6998 0% /var/tmp2/upgrade v9fs 837452 120612 716840 14% /opt IP560[admin]# '''Flash-Only installation verification information''' -------------------------------------------------------------- IP560[admin]# df -k Filesystem 1K-blocks Used Avail Capacity Mounted on /dev/wd0f 266383 44080 200993 18% / v9fs 755824 50548 705276 7% /image/IPSO-4.1-BUILD013-03.27.2006-223017-1515/rfs /dev/wd0a 31775 161 29072 1% /config /dev/wd0h 664831 205478 406167 34% /preserve procfs 4 4 0 100% /proc v9fs 716840 11564 705276 2% /var mfs:97 7607 0 6998 0% /var/tmp2/upgrade v9fs 825888 120612 705276 15% /opt IP560[admin]# Nokia hardware info 0 47 52 2013-04-12T15:59:09Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == general hardware info == ipsctl -a |grep eeprom determine if firewall has 10G cards and what type firewall[admin]# '''ipsctl -a |grep 10G''' hw:eeprom:ixgbe_1_1:product_id = Nokia 10G XMC hw:eeprom:ixgbe_1_2:product_id = Nokia 10G XMC [[category:nokia]] Parse objects and rules 0 23 27 2013-02-26T00:26:27Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == get object name for given UID == cat objects_5_0.C |grep -m 1 -B 2 2FD225F6-A25F-475C-934B-C0DC122A2FDC |grep -m 1 : | sed -e 's/://' | tr -d '(' | sed 's/^[ \t]*//' == get orig dst object UID from rulebases_5.0.fws == cat rulebases_5_0.fws | grep -A 3 "dst_adtr" | grep chkpf_uid | sed -e 's/("{//' | sed -e 's/}")//' | awk '{print $2}' [[category:check point]] Performance analysis for Security Gateway NGX R65 / R7x 0 8 9 2013-02-25T22:10:52Z Nighthawk 1 Created page with "Performance analysis for Security Gateway NGX R65 / R7x https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk33781&js_p..." wikitext text/x-wiki Performance analysis for Security Gateway NGX R65 / R7x https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk33781&js_peid=P-114a7bc3b09-10006&partition=General&product=Security [[category:performance]] Problem - fwm start failure on mds 0 52 57 2013-04-12T16:27:23Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == Problem description: == # mds fails to fuly start up # problem with guis connecting to CMA/CLM from MDG # mdsstat shows MDS fwm down after mdsstart == Troubleshooting steps == start fwm in debug mode (from mds environment) # mdsenv # fwm -d mds [Expert@r65_mdshost]# fwm -d mds [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] cpobj_get_plugin_conf_info: Could not open file (/opt/CPPIconnectra-R65/conf/plugin_groups.conf). [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_create: version 5301. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_add_name_to_group: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_set_local_names: () names. finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_create: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_read (/opt/CPshrd-R65/conf/sic_policy.conf): finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_set_external_host_groups: 43 names. finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_add_name_to_group: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_set_local_names: (local_sic_name) names. finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_add_name_to_group: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_set_local_names: (171.186.108.253) names. finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_add_name_to_group: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_policy_set_local_names: ("CN=cp_mgmt_r65_mdshost,O=iproricNGX2..rsyqv9") names. finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_apply_default_dn: ca_dn = [O=iproricNGX2..rsyqv9]. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_apply_default_dn: calling PM_policy_DN_conversion .. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] PM_apply_default_dn: finished successfully. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 12 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Error opening file /opt/CPshrd-R65/database//authkeys.C:: No such file or directory [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 12 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 12 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 32 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 12 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 12 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 32 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 32 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 11 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 31 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 11 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 11 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 31 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] ckpSSLctx_New: prefs = 31 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] peers addresses are [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] 171.186.108.253 [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] sic_client_do_connect: using server local sic name. [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] is_command_no_need_for_license: it's ok to run this command, without special checking [ 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] is_msp_environment_set_correctly> YES [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] CPPRODIS_init_error_logging_ex: initialized error logging for product 'FW1' application 'MDS'. Log file is not set. [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] raise_file_limit: raising limit from 1024 to 1024 [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] FW Cleaner: Adding cleanup function FwmIsAliveMutex_Destroy() (0x80fb840, 0x1849) [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Env Configuration: ( :type (opsec_info) ) [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Could not find info for ...opsec_sic_name... [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Could not find info for ...opsec_sslca_file... [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Could not find info for ...opsec_shared_local_path... [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Could not find info for ...opsec_sic_policy_file... [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] Could not find info for ...opsec_mt... [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] opsec_init: multithread safety is not initialized [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:37] FW Cleaner: Adding cleanup function FwmDestroyOpsecEnv() (0x824afb0, 0x0) [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:38] fwa_db_init_with_scope: called [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:38] do_links_getver: strncmp failed. Returning -2 [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] port found in reg 1024 [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] cplog_localtcpip: found port 1024 [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] Failed to connect to FWD (log connection). [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] resolver_gethostbyname: Performing gethostbyname for r65_mdshost [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] resolver_gethostbyname: Failed to resolve hostname 'r65_mdshost' fw_ipaddr: Unable to resolve ipaddr for r65_mdshost: Resource temporarily unavailable [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] FW Cleaner: calling cleanup function FwmIsAliveMutex_Destroy() (0x80fb840, 0x1849) [MDS 6217 2002609888]@r65_mdshost[20 Jul 15:41:39] FW Cleaner: calling cleanup function FwmDestroyOpsecEnv() (0x824afb0, 0x0) '''hosts file doesn't contain mds hostname''' # cat /etc/hosts 192.168.1.100 -n # Do not remove the following line, or various programs # that require network functionality will fail. 127.0.0.1 localhost.localdomain localhost == Solution == '''fix hosts file''' mdsstop -m; mdsstart -m [Expert@r65_mdshost]# mdsstat |grep MDS MDS | 192.168.1.100 | up 6474 | up 6473 | up 6472 | N/R | [[category:check point]] Problem nokia boot flash boot failed 0 94 150 2013-05-24T16:17:16Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki '''Problem description:''' Flash based Nokia firewall fails to boot up after an O.S. installation. Also, IPSO installation fails at the boot manager because no valid device is found to install to. '''Error messages:''' BOOTMGR[29]> boot /dev/wd0f on /mnt: Incorrect super block. Error: /image on /dev/wd0f does not exist or is not a file umount: /mnt: not currently mounted boot failed Solution: BOOTMGR[30]> sh # '''disklabel -r /dev/wd0s4 > /tmp/label''' super block size 0 # '''disklabel -R /dev/wd0s4 /tmp/label''' # exit [[category:nokia]] R77 upgrade via CLI 0 180 517 516 2014-07-16T09:35:28Z Nighthawk 1 wikitext text/x-wiki This terminal log is for upgrading an existing Gaia check point device to R77, R77.10, or presumably R77.20. The source device can be R75.4x or above. In this example the firewall was R76. commands run are in bold. chkpfw:0]# '''clish''' chkpfw> '''add upgrade R77.10 package /var/log/download/Check_Point_R77.10_T1551_upg_WEBUI_and_SmartUpdate.Gaia.tgz''' chkpfw> '''upgrade local R77.10''' Extracting... [03:58:36] Start loading default params Performing products initialization... Done Would you like to save a snapshot of the system before upgrade (yes/no)? '''yes''' [03:58:41] Start snapshot creation Creating snapshot... Snapshot created successfully [04:06:28] Start verification You are about to start upgrade to R77.10 Gaia. Are you sure you want to continue (yes/no)? '''yes''' Performing products verification... Pre-upgrade verification finished successfully. Check the file /tmp/pre_upgrade_out.txt for more details. Done [04:07:20] Start pre upgrade Performing products pre upgrade... Done [04:07:21] Start loading platform params [04:07:21] Start kernel upgrade [04:07:40] Start OS upgrade INIT: version 2.86 reloading INIT: version 2.86 reloading [04:08:44] Start database upgrade [04:08:44] Start products upgrade Importing CP wrapper... Done Performing products upgrade... Done [04:11:46] Start post upgrade Performing products post upgrade... Done Post upgrade finished successfully Upgrade finished Type OK to reboot the machine. '''ok''' [[category:upgrade]] 516 515 2014-07-16T09:35:02Z Nighthawk 1 wikitext text/x-wiki This guide is for upgrading an existing Gaia check point device to R77, R77.10, or presumably R77.20. The source device can be R75.4x or above. In this example the firewall was R76. commands run are in bold. chkpfw:0]# '''clish''' chkpfw> '''add upgrade R77.10 package /var/log/download/Check_Point_R77.10_T1551_upg_WEBUI_and_SmartUpdate.Gaia.tgz''' chkpfw> '''upgrade local R77.10''' Extracting... [03:58:36] Start loading default params Performing products initialization... Done Would you like to save a snapshot of the system before upgrade (yes/no)? '''yes''' [03:58:41] Start snapshot creation Creating snapshot... Snapshot created successfully [04:06:28] Start verification You are about to start upgrade to R77.10 Gaia. Are you sure you want to continue (yes/no)? '''yes''' Performing products verification... Pre-upgrade verification finished successfully. Check the file /tmp/pre_upgrade_out.txt for more details. Done [04:07:20] Start pre upgrade Performing products pre upgrade... Done [04:07:21] Start loading platform params [04:07:21] Start kernel upgrade [04:07:40] Start OS upgrade INIT: version 2.86 reloading INIT: version 2.86 reloading [04:08:44] Start database upgrade [04:08:44] Start products upgrade Importing CP wrapper... Done Performing products upgrade... Done [04:11:46] Start post upgrade Performing products post upgrade... Done Post upgrade finished successfully Upgrade finished Type OK to reboot the machine. '''ok''' [[category:upgrade]] 515 2014-07-16T09:32:59Z Nighthawk 1 Created page with "This guide is for upgrading an existing Gaia check point device to R77, R77.10, or presumably R77.20. The source device can be R75.4x or above. In this example the firewall ..." wikitext text/x-wiki This guide is for upgrading an existing Gaia check point device to R77, R77.10, or presumably R77.20. The source device can be R75.4x or above. In this example the firewall was R76. commands run are in bold. chkpfw:0]# '''clish''' chkpfw> '''add upgrade R77.10 package /var/log/download/Check_Point_R77.10_T1551_upg_WEBUI_and_SmartUpdate.Gaia.tgz''' chkpfw> '''upgrade local R77.10''' Extracting... [03:58:36] Start loading default params Performing products initialization... Done Would you like to save a snapshot of the system before upgrade (yes/no)? yes [03:58:41] Start snapshot creation Creating snapshot... Snapshot created successfully [04:06:28] Start verification You are about to start upgrade to R77.10 Gaia. Are you sure you want to continue (yes/no)? '''yes''' Performing products verification... Pre-upgrade verification finished successfully. Check the file /tmp/pre_upgrade_out.txt for more details. Done [04:07:20] Start pre upgrade Performing products pre upgrade... Done [04:07:21] Start loading platform params [04:07:21] Start kernel upgrade [04:07:40] Start OS upgrade INIT: version 2.86 reloading INIT: version 2.86 reloading [04:08:44] Start database upgrade [04:08:44] Start products upgrade Importing CP wrapper... Done Performing products upgrade... Done [04:11:46] Start post upgrade Performing products post upgrade... Done Post upgrade finished successfully Upgrade finished Type OK to reboot the machine. '''ok''' [[category:upgrade]] RHEL 6.5 install 0 207 666 665 2017-05-25T00:45:29Z Nighthawk 1 wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== replace /etc/yum.repos.d/rhel-source.repo contents with the following [[centos 6.5 repo]] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] run to import vault key # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6 ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 ===bad ELF interpreter=== '''error message''' # ./UnixInstallScript: ./UnixInstallScript: /lib/ld-linux.so.2: bad ELF interpreter: No such file or directory '''solution''' install missing glibc # yum install glibc.i686 === libpam.so.0 === '''error:''' ./UnixInstallScript: error while loading shared libraries: libpam.so.0: cannot open shared object file: No such file or directory '''solution:''' install 32-bit pam. you will likely need to update the 64-bit to match to avoid Multilib version errors. The following command will do this. # yum install pam.x86_64 pam.i686 ==links== [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] [[category:rhel]] cb15c07970f4d4b5626c1adb941bdc64c09b7169 665 664 2017-05-25T00:31:32Z Nighthawk 1 /* libz.so.1 error */ wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== replace /etc/yum.repos.d/rhel-source.repo contents with the following [[centos 6.5 repo]] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] run to import vault key # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6 ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 ==links== [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] [[category:rhel]] d0e1541675e2761928c5906a952c69b825aba84e 664 663 2017-05-25T00:31:16Z Nighthawk 1 /* using centos yum repo */ wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== replace /etc/yum.repos.d/rhel-source.repo contents with the following [[centos 6.5 repo]] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] run to import vault key # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6 ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 [[category:rhel]] 5ff5b3d8808d4c5688302cc37235b7f5bf6abe34 663 658 2017-05-25T00:30:57Z Nighthawk 1 /* using centos yum repo */ wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== replace /etc/yum.repos.d/rhel-source.repo contents with the following [[centos 6.5 repo]] [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] run to import vault key # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6 ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 [[category:rhel]] 2a6a26f075d38d5eb47c70919c119856562e7726 658 633 2017-05-24T22:25:40Z Nighthawk 1 /* using centos yum repo */ wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] run to import vault key # rpm --import http://vault.centos.org/6.5/os/x86_64/RPM-GPG-KEY-CentOS-6 ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 [[category:rhel]] 27b92625dd39f25d1d87ef9f92f9e6d6ed09d80c 633 632 2017-04-29T16:43:24Z Nighthawk 1 wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso ==troubleshooting== ===libz.so.1 error=== errors occur during configuration on install or when cpconfig is run '''error message:''' Do you want to add an administrator (y/n) [y] ? /opt/CPsuite-R77/fw1/bin/fwm: error while loading shared libraries: libz.so.1: cannot open shared object file: No such file or directory '''cause''' # yum list zlib Installed Packages zlib.x86_64 1.2.3-29.el6 @anaconda-RedHatEnterpriseLinux-201311111358.x86_64/6.5 Available Packages zlib.i686 1.2.3-29.el6 CentOS6base '''solution''' install 32bit libz # yum install zlib.i686 [[category:rhel]] d1bc3e4fd9d9b8e28ec50e16232e8a0d2b41d3b0 632 631 2017-04-29T16:27:00Z Nighthawk 1 wikitext text/x-wiki ==installing prereqs== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760 Prerequisites for installing Security Management Server / Multi-Domain Security Management Server on Red Hat Enterprise Linux] ==using centos yum repo== [http://it.tuxie.eu/?p=404 RHEL 6.5 x64 with CentOS 6.5 repositories] vault access to older/deprecated centos repos - [http://vault.centos.org/6.5/os/x86_64/ vault.centos.org 64bit centos] ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso [[category:rhel]] eaf59a0b82a545726321e5304bb3ebc4a490e97d 631 2017-04-29T16:04:15Z Nighthawk 1 Created page with "==installing prereqs== ==using centos yum repo== ==installing check point== which package to install from the support site? the iso to download will usually say "install" ..." wikitext text/x-wiki ==installing prereqs== ==using centos yum repo== ==installing check point== which package to install from the support site? the iso to download will usually say "install" and "open_server" for example... Check_Point_R77.30_T207_Install_and_Upgrade.SPLAT_Open_Server.iso 058a02cd31501173863f0525a0313320259ac01b Renaming a check point firewall object 0 53 58 2013-04-12T16:29:32Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki 1) Reset SIC but DON'T re-initialize 2) firewall name will be editable when you OK out [[category:check point]] SIC General Failure and T get event: bad socket/type 0 139 359 2014-03-09T00:00:34Z Nighthawk 1 moved [[SIC General Failure and T get event: bad socket/type]] to [[SIC General Failure and "T get event: bad socket" erros]] wikitext text/x-wiki #REDIRECT [[SIC General Failure and "T get event: bad socket" erros]] SIC General Failure and T get event bad socket errors 0 138 364 363 2014-03-09T00:04:32Z Nighthawk 1 moved [[SIC General Failure and T get event: bad socket errors]] to [[SIC General Failure and T get event bad socket errors]] wikitext text/x-wiki SIC General Failure and "T_get_event: bad socket/type" errors == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] 363 362 2014-03-09T00:04:03Z Nighthawk 1 wikitext text/x-wiki SIC General Failure and "T_get_event: bad socket/type" errors == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] 362 360 2014-03-09T00:03:21Z Nighthawk 1 moved [[SIC General Failure and "T get event: bad socket" errors]] to [[SIC General Failure and T get event: bad socket errors]] wikitext text/x-wiki == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] 360 358 2014-03-09T00:00:50Z Nighthawk 1 moved [[SIC General Failure and "T get event: bad socket" erros]] to [[SIC General Failure and "T get event: bad socket" errors]] wikitext text/x-wiki == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] 358 357 2014-03-09T00:00:34Z Nighthawk 1 moved [[SIC General Failure and T get event: bad socket/type]] to [[SIC General Failure and "T get event: bad socket" erros]] wikitext text/x-wiki == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] 357 2014-03-08T23:48:53Z Nighthawk 1 Created page with " == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from within..." wikitext text/x-wiki == Problem Description == Unable to install firewall policies due to SIC error Platform: Nokia O.S.: ipso 6.2-GA039 fw version: NGX (R65) HFA_70 Testing SIC from withing the SmartDashboard... <br>SIC Status for firewall-1: Not Communicating <br>SIC General Failure [error no. 148] error 148 according to sk16200... "This error means a timeout has occurred during the SIC process" Errors in $CPDIR/log/cpd.elg T_get_event: bad socket/type: 1200/0 If you tail the above file while testing SIC, the errors pour in... tcpdump between management and the firewall show a good handshake and communication. == Root Cause == Suspected file descriptor or memory leak issue ==Solution== restart or stop and start cpd # '''cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command "cpd_admin stop"''' CPD stopped cpwd_admin: Process CPD (pid=953) stopped with command 'cpd_admin stop'. Exit code 0. # '''cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command "cpd"''' cpwd_admin: Process CPD started successfully (pid=40018) [[category:sic]] [[category:cpd]] SRX notes 0 67 914 863 2024-06-20T14:28:52Z Nighthawk 1 wikitext text/x-wiki junos SRX notes show interface IPs > show interfaces terse | match inet show rule / policy # show security policies from-zone trust to-zone untrust policy <policy_name> search address book for pre-defined objects # show security zones security-zone untrust address-book | match "192.168.1.1" monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root example new rule (in progress) match > permit > insert ==VM download== [https://webdownload.juniper.net/swdl/dl/secure/site/1/record/117212.html?pf=vSRX%20EVAL https://webdownload.juniper.net/swdl/dl/secure/site/1/record/117212.html?pf=vSRX%20EVAL] [[category:juniper]] 9cb721fd8fa24b0393e3038885dbd7a7c209e331 863 846 2021-05-06T19:41:57Z Nighthawk 1 wikitext text/x-wiki junos SRX notes show rule / policy # show security policies from-zone trust to-zone untrust policy <policy_name> search address book for pre-defined objects # show security zones security-zone untrust address-book | match "192.168.1.1" monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root example new rule (in progress) match > permit > insert ==VM download== [https://webdownload.juniper.net/swdl/dl/secure/site/1/record/117212.html?pf=vSRX%20EVAL https://webdownload.juniper.net/swdl/dl/secure/site/1/record/117212.html?pf=vSRX%20EVAL] [[category:juniper]] 78ddc3f1dac2adebb2c7f744ed2cb64eaaa2c816 846 845 2020-08-26T18:24:11Z Nighthawk 1 wikitext text/x-wiki junos SRX notes show rule / policy # show security policies from-zone trust to-zone untrust policy <policy_name> search address book for pre-defined objects # show security zones security-zone untrust address-book | match "192.168.1.1" monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root example new rule (in progress) match > permit > insert [[category:juniper]] d16a1e2805d7b3ca85db2246edb4ff1bb02c9397 845 844 2020-08-19T23:29:38Z Nighthawk 1 wikitext text/x-wiki junos SRX notes show rule / policy # show security policies from-zone trust to-zone untrust policy <policy_name> search address book for pre-defined objects # show security zones security-zone untrust address-book | match "192.168.1.1" monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root [[category:juniper]] 0b8fedcc2610e44cb3a1c279d5575d6a299ae213 844 356 2020-08-19T23:29:21Z Nighthawk 1 wikitext text/x-wiki junos SRX notes show rule / policy # show security policies from-zone trust to-zone untrust policy <policy_name> search address book for pre-defined objects # show security zones security-zone untrust address-book | match "192.168.1.1" monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no show security rules ...? add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root [[category:juniper]] 5dcae4f9e7e5882924024eee3d25d904565fbf1e 356 149 2014-03-08T22:38:15Z Nighthawk 1 wikitext text/x-wiki junos SRX notes monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no show security rules ...? add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 start unix shell > start shell user root [[category:juniper]] 149 96 2013-05-24T16:13:11Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki junos SRX notes monitoring traffic example monitor traffic matching "host 10.0.0.1" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no show security rules ...? add proxy arp set security nat proxy-arp interface reth0 address 192.168.1.1 [[category:juniper]] 96 2013-05-17T15:31:08Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki junos SRX notes monitoring traffic example monitor traffic matching "host 76.185.116.115" no-resolve interface reth0 show cluster status root@SRXfw> '''show chassis cluster status''' Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 0 node0 200 primary no no node1 100 secondary no no Redundancy group: 1 , Failover count: 3 node0 200 secondary no no node1 100 primary no no show security rules ...? add proxy arp set security nat proxy-arp interface reth0 address 171.162.209.220 [[category:juniper]] Secondary CMA/CLM SIC expiration renewal procedure 0 14 104 103 2013-05-20T19:54:54Z Nighthawk 1 /* Solution */ wikitext text/x-wiki Reset SIC between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 Primary CMA other keyworkds: certificate expired, Solution ID: sk36359 Product: Multi-Domain Management / Provider-1 Version: All == Symptoms == 1) Smartdashboard SIC communication test from the CMA reports... "SIC Status for Inet-VPN-CLM2: Not Communicating Internal SSL authentication error [ Certificate expired]" 2) [Expert@mds]# cpca_client lscert -kind SIC|grep -A 2 CLM Subject = CN=Inet-VPN-CLM,O=cr-provider-vpn..xcoz95 Status = Expired Kind = SIC Serial = 73304 Not_Before: Fri Oct 27 14:12:28 2006 Not_After: Mon Jan 18 22:00:08 2038 3) No new logs received on the CLM == Cause == Expired SIC certificates between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 CMA == Solution == Here are the steps to set SIC between the Secondary CMA/CLM and the respective CMA '''On the Provider-1 MDS/MLM(the one containing the expired CMA/CLM) server :''' Log into Expert mode (for SecurePlatform). Run the 'mdsenv' command to change the current environment to that of the relevant Secondary CMA/CLM. # mdsenv cma_name Run the following command to re-initialize the SIC (pre-shared secret is 'abc123'): # cp_conf sic init abc123 Note: the CPD daemon for the relevant CMA/CLM is in a 'down' state at this point in time. '''On the MDS (Manager) Provider-1 Server''' mdsenv Restart the CLM mdscmd stopcma ''customer_name'' -i ''<secondary_cma/clm_ip>'' mdscmd startcma ''customer_name'' -i ''<secondary_cma/clm_ip>'' '''On the MLM''' Verify that the CPD process is up and running for the relevant Secondary CMA/CLM: # mdsstat '''In the SmartDashboard (logged into the CMA):''' Select 'Manage' - then 'Network Objects'. In the 'Network Objects' dialog box, select the relevant Secondary CMA/CLM network object from the network objects list. Click on 'Edit'. In the 'Check Point Host' dialog box, select the 'General Properties' branch from the left pane. In the 'General Properties' pane, in the 'Secure Internal Communication' section, click on 'Communication'. In the 'Communication' dialog box, click on 'Reset'. A dialog box with the following message will be displayed: Check Point SmartDashboard <p>For the reset operation to be complete, you must also reset the module in the configuration tool. No communication will be possible until you reset and re-initialize the communication properly</p> Are you sure you want to reset? Click on 'Yes'. A dialog box with the following message will be displayed: Check Point SmartDashboard Reset is done. Please re-install the Security Policy in order to update the CRL list. You must install the Security Policy to ALL Modules. Click on 'OK'. In the 'Communication' dialog box, in the 'Activation Key' field, enter pre-shared secret (i.e., 'abc123'). In the 'Communication' dialog box, in the 'Confirm Activation Key' field, re-enter the pre-shared secret (i.e., 'abc123'). Click on 'Initialize'. In the 'Communication' dialog box, click on 'Close'. '''Reinstall policies to all firewalls managed by the CMA to re-establish logging.''' [[category:check point]] 103 17 2013-05-20T19:53:50Z Nighthawk 1 /* Solution */ wikitext text/x-wiki Reset SIC between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 Primary CMA other keyworkds: certificate expired, Solution ID: sk36359 Product: Multi-Domain Management / Provider-1 Version: All == Symptoms == 1) Smartdashboard SIC communication test from the CMA reports... "SIC Status for Inet-VPN-CLM2: Not Communicating Internal SSL authentication error [ Certificate expired]" 2) [Expert@mds]# cpca_client lscert -kind SIC|grep -A 2 CLM Subject = CN=Inet-VPN-CLM,O=cr-provider-vpn..xcoz95 Status = Expired Kind = SIC Serial = 73304 Not_Before: Fri Oct 27 14:12:28 2006 Not_After: Mon Jan 18 22:00:08 2038 3) No new logs received on the CLM == Cause == Expired SIC certificates between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 CMA == Solution == Here are the steps to set SIC between the Secondary CMA/CLM and the respective CMA '''On the Provider-1 MDS/MLM(the one containing the expired CMA/CLM) server :''' Log into Expert mode (for SecurePlatform). Run the 'mdsenv' command to change the current environment to that of the relevant Secondary CMA/CLM. # mdsenv cma_name Run the following command to re-initialize the SIC (pre-shared secret is 'abc123'): # cp_conf sic init abc123 Note: the CPD daemon for the relevant CMA/CLM is in a 'down' state at this point in time. '''On the MDS (Manager) Provider-1 Server''' mdsenv Restart the CLM mdscmd stopcma ''customer_name'' -i ''<secondary_cma/clm_ip>'' mdscmd startcma ''customer_name'' -i ''<secondary_cma/clm_ip>'' '''On the MLM''' Verify that the CPD process is up and running for the relevant Secondary CMA/CLM: # mdsstat '''In the SmartDashboard (logged into the CMA):''' Select 'Manage' - then 'Network Objects'. In the 'Network Objects' dialog box, select the relevant Secondary CMA/CLM network object from the network objects list. Click on 'Edit'. In the 'Check Point Host' dialog box, select the 'General Properties' branch from the left pane. In the 'General Properties' pane, in the 'Secure Internal Communication' section, click on 'Communication'. In the 'Communication' dialog box, click on 'Reset'. A dialog box with the following message will be displayed: Check Point SmartDashboard For the reset operation to be complete, you must also reset the module in the configuration tool. No communication will be possible until you reset and re-initialize the communication properly. Are you sure you want to reset? Click on 'Yes'. A dialog box with the following message will be displayed: Check Point SmartDashboard Reset is done. Please re-install the Security Policy in order to update the CRL list. You must install the Security Policy to ALL Modules. Click on 'OK'. In the 'Communication' dialog box, in the 'Activation Key' field, enter pre-shared secret (i.e., 'abc123'). In the 'Communication' dialog box, in the 'Confirm Activation Key' field, re-enter the pre-shared secret (i.e., 'abc123'). Click on 'Initialize'. In the 'Communication' dialog box, click on 'Close'. '''Reinstall policies to all firewalls managed by the CMA to re-establish logging.''' [[category:check point]] 17 16 2013-02-25T22:51:19Z Nighthawk 1 moved [[Secondary CMA/CLM SIC expiration]] to [[Secondary CMA/CLM SIC expiration renewal procedure]] wikitext text/x-wiki Reset SIC between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 Primary CMA other keyworkds: certificate expired, Solution ID: sk36359 Product: Multi-Domain Management / Provider-1 Version: All == Symptoms == 1) Smartdashboard SIC communication test from the CMA reports... "SIC Status for Inet-VPN-CLM2: Not Communicating Internal SSL authentication error [ Certificate expired]" 2) [Expert@mds]# cpca_client lscert -kind SIC|grep -A 2 CLM Subject = CN=Inet-VPN-CLM,O=cr-provider-vpn..xcoz95 Status = Expired Kind = SIC Serial = 73304 Not_Before: Fri Oct 27 14:12:28 2006 Not_After: Mon Jan 18 22:00:08 2038 3) No new logs received on the CLM == Cause == Expired SIC certificates between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 CMA == Solution == Here are the steps to set SIC between the Secondary CMA/CLM and the respective CMA '''On the Provider-1 MDS/MLM(the one containing the expired CMA/CLM) server :''' Log into Expert mode (for SecurePlatform). Run the 'mdsenv' command to change the current environment to that of the relevant Secondary CMA/CLM. # mdsenv cma_name Run the following command to re-initialize the SIC (pre-shared secret is 'abc123'): # cp_conf sic init abc123 Note: the CPD daemon for the relevant CMA/CLM is in a 'down' state at this point in time. '''On the MDS (Manager) Provider-1 Server''' mdsenv Restart the CLM mdscmd stopcma ''customer_name'' -i ''<cma_ip>'' mdscmd startcma ''customer_name'' -i ''<clm_ip>'' '''On the MLM''' Verify that the CPD process is up and running for the relevant Secondary CMA/CLM: # mdsstat '''In the SmartDashboard (logged into the CMA):''' Select 'Manage' - then 'Network Objects'. In the 'Network Objects' dialog box, select the relevant Secondary CMA/CLM network object from the network objects list. Click on 'Edit'. In the 'Check Point Host' dialog box, select the 'General Properties' branch from the left pane. In the 'General Properties' pane, in the 'Secure Internal Communication' section, click on 'Communication'. In the 'Communication' dialog box, click on 'Reset'. A dialog box with the following message will be displayed: Check Point SmartDashboard For the reset operation to be complete, you must also reset the module in the configuration tool. No communication will be possible until you reset and re-initialize the communication properly. Are you sure you want to reset? Click on 'Yes'. A dialog box with the following message will be displayed: Check Point SmartDashboard Reset is done. Please re-install the Security Policy in order to update the CRL list. You must install the Security Policy to ALL Modules. Click on 'OK'. In the 'Communication' dialog box, in the 'Activation Key' field, enter pre-shared secret (i.e., 'abc123'). In the 'Communication' dialog box, in the 'Confirm Activation Key' field, re-enter the pre-shared secret (i.e., 'abc123'). Click on 'Initialize'. In the 'Communication' dialog box, click on 'Close'. '''Reinstall policies to all firewalls managed by the CMA to re-establish logging.''' [[category:check point]] 16 15 2013-02-25T22:49:59Z Nighthawk 1 wikitext text/x-wiki Reset SIC between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 Primary CMA other keyworkds: certificate expired, Solution ID: sk36359 Product: Multi-Domain Management / Provider-1 Version: All == Symptoms == 1) Smartdashboard SIC communication test from the CMA reports... "SIC Status for Inet-VPN-CLM2: Not Communicating Internal SSL authentication error [ Certificate expired]" 2) [Expert@mds]# cpca_client lscert -kind SIC|grep -A 2 CLM Subject = CN=Inet-VPN-CLM,O=cr-provider-vpn..xcoz95 Status = Expired Kind = SIC Serial = 73304 Not_Before: Fri Oct 27 14:12:28 2006 Not_After: Mon Jan 18 22:00:08 2038 3) No new logs received on the CLM == Cause == Expired SIC certificates between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 CMA == Solution == Here are the steps to set SIC between the Secondary CMA/CLM and the respective CMA '''On the Provider-1 MDS/MLM(the one containing the expired CMA/CLM) server :''' Log into Expert mode (for SecurePlatform). Run the 'mdsenv' command to change the current environment to that of the relevant Secondary CMA/CLM. # mdsenv cma_name Run the following command to re-initialize the SIC (pre-shared secret is 'abc123'): # cp_conf sic init abc123 Note: the CPD daemon for the relevant CMA/CLM is in a 'down' state at this point in time. '''On the MDS (Manager) Provider-1 Server''' mdsenv Restart the CLM mdscmd stopcma ''customer_name'' -i ''<cma_ip>'' mdscmd startcma ''customer_name'' -i ''<clm_ip>'' '''On the MLM''' Verify that the CPD process is up and running for the relevant Secondary CMA/CLM: # mdsstat '''In the SmartDashboard (logged into the CMA):''' Select 'Manage' - then 'Network Objects'. In the 'Network Objects' dialog box, select the relevant Secondary CMA/CLM network object from the network objects list. Click on 'Edit'. In the 'Check Point Host' dialog box, select the 'General Properties' branch from the left pane. In the 'General Properties' pane, in the 'Secure Internal Communication' section, click on 'Communication'. In the 'Communication' dialog box, click on 'Reset'. A dialog box with the following message will be displayed: Check Point SmartDashboard For the reset operation to be complete, you must also reset the module in the configuration tool. No communication will be possible until you reset and re-initialize the communication properly. Are you sure you want to reset? Click on 'Yes'. A dialog box with the following message will be displayed: Check Point SmartDashboard Reset is done. Please re-install the Security Policy in order to update the CRL list. You must install the Security Policy to ALL Modules. Click on 'OK'. In the 'Communication' dialog box, in the 'Activation Key' field, enter pre-shared secret (i.e., 'abc123'). In the 'Communication' dialog box, in the 'Confirm Activation Key' field, re-enter the pre-shared secret (i.e., 'abc123'). Click on 'Initialize'. In the 'Communication' dialog box, click on 'Close'. '''Reinstall policies to all firewalls managed by the CMA to re-establish logging.''' [[category:check point]] 15 2013-02-25T22:48:59Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki Reset SIC between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 Primary CMA Solution ID: sk36359 Product: Multi-Domain Management / Provider-1 Version: All == Symptoms == 1) Smartdashboard SIC communication test from the CMA reports... "SIC Status for Inet-VPN-CLM2: Not Communicating Internal SSL authentication error [ Certificate expired]" 2) [Expert@mds]# cpca_client lscert -kind SIC|grep -A 2 CLM Subject = CN=Inet-VPN-CLM,O=cr-provider-vpn..xcoz95 Status = Expired Kind = SIC Serial = 73304 Not_Before: Fri Oct 27 14:12:28 2006 Not_After: Mon Jan 18 22:00:08 2038 3) No new logs received on the CLM == Cause == Expired SIC certificates between the Provider-1 Secondary CMA/CLM and the respecitve Provider-1 CMA == Solution == Here are the steps to set SIC between the Secondary CMA/CLM and the respective CMA '''On the Provider-1 MDS/MLM(the one containing the expired CMA/CLM) server :''' Log into Expert mode (for SecurePlatform). Run the 'mdsenv' command to change the current environment to that of the relevant Secondary CMA/CLM. # mdsenv cma_name Run the following command to re-initialize the SIC (pre-shared secret is 'abc123'): # cp_conf sic init abc123 Note: the CPD daemon for the relevant CMA/CLM is in a 'down' state at this point in time. '''On the MDS (Manager) Provider-1 Server''' mdsenv Restart the CLM mdscmd stopcma ''customer_name'' -i ''<cma_ip>'' mdscmd startcma ''customer_name'' -i ''<clm_ip>'' '''On the MLM''' Verify that the CPD process is up and running for the relevant Secondary CMA/CLM: # mdsstat '''In the SmartDashboard (logged into the CMA):''' Select 'Manage' - then 'Network Objects'. In the 'Network Objects' dialog box, select the relevant Secondary CMA/CLM network object from the network objects list. Click on 'Edit'. In the 'Check Point Host' dialog box, select the 'General Properties' branch from the left pane. In the 'General Properties' pane, in the 'Secure Internal Communication' section, click on 'Communication'. In the 'Communication' dialog box, click on 'Reset'. A dialog box with the following message will be displayed: Check Point SmartDashboard For the reset operation to be complete, you must also reset the module in the configuration tool. No communication will be possible until you reset and re-initialize the communication properly. Are you sure you want to reset? Click on 'Yes'. A dialog box with the following message will be displayed: Check Point SmartDashboard Reset is done. Please re-install the Security Policy in order to update the CRL list. You must install the Security Policy to ALL Modules. Click on 'OK'. In the 'Communication' dialog box, in the 'Activation Key' field, enter pre-shared secret (i.e., 'abc123'). In the 'Communication' dialog box, in the 'Confirm Activation Key' field, re-enter the pre-shared secret (i.e., 'abc123'). Click on 'Initialize'. In the 'Communication' dialog box, click on 'Close'. '''Reinstall policies to all firewalls managed by the CMA to re-establish logging.''' [[category:check point]] SecureXL Mechanism 0 167 490 462 2014-06-06T17:16:55Z Nighthawk 1 wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 == Traffic acceleration: == When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: * The first packets of any new TCP session, unless a "template" exists. * The first packet of any new UDP session. * All traffic that matches a service that uses a Resource. * Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). * All traffic that is supposed to be dropped or rejected, according to the rule base. * All traffic that matches a rule, whose source or destination is the Security Gateway itself. * All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). * All traffic that matches a rule with User Authentication or Session Authentication. * Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). * CIFS traffic. * IPv6 traffic. * All multicast traffic. * All fragmented traffic. * All traffic with IP options. * Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). * TCP RST packets, when the "Spoofed Reset Protection" feature is activated. * When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. * Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: * Connections that cannot be discriminated ONLY by the source port cannot be templated. * NATed traffic cannot be templated. * VPN traffic cannot be templated. * Complex connections (FTP, H323, SQL, etc.) cannot be templated. * Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. * The following rules will prevent a Connection Template from being created. * All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): * Rule with service 'Any' (resolved in R75.40 and above) * Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). * Rules with the following objects: * Time object * Port range object (resolved in R75.40 and above) * Dynamic object * Domain object * Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). * Rules with RPC/DCOM/DCE-RPC services. * Rules with Client Authentication or Session Authentication. * When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. 462 461 2014-05-16T02:24:49Z Nighthawk 1 wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 == Traffic acceleration: == When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: * The first packets of any new TCP session, unless a "template" exists. * The first packet of any new UDP session. * All traffic that matches a service that uses a Resource. * Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). * All traffic that is supposed to be dropped or rejected, according to the rule base. * All traffic that matches a rule, whose source or destination is the Security Gateway itself. * All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). * All traffic that matches a rule with User Authentication or Session Authentication. * Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). * CIFS traffic. * IPv6 traffic. * All multicast traffic. * All fragmented traffic. * All traffic with IP options. * Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). * TCP RST packets, when the "Spoofed Reset Protection" feature is activated. * When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. * Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: * Connections that cannot be discriminated ONLY by the source port cannot be templated. * NATed traffic cannot be templated. * VPN traffic cannot be templated. * Complex connections (FTP, H323, SQL, etc.) cannot be templated. * Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. * The following rules will prevent a Connection Template from being created. * All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): * Rule with service 'Any' (resolved in R75.40 and above) * Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). * Rules with the following objects: * Time object * Port range object (resolved in R75.40 and above) * Dynamic object * Domain object * Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). * Rules with RPC/DCOM/DCE-RPC services. * Rules with Client Authentication or Session Authentication. * When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. 461 460 2014-05-16T02:24:38Z Nighthawk 1 wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 == Traffic acceleration: == When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: * The first packets of any new TCP session, unless a "template" exists. * The first packet of any new UDP session. * All traffic that matches a service that uses a Resource. * Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). * All traffic that is supposed to be dropped or rejected, according to the rule base. * All traffic that matches a rule, whose source or destination is the Security Gateway itself. * All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). * All traffic that matches a rule with User Authentication or Session Authentication. * Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). * CIFS traffic. * IPv6 traffic. * All multicast traffic. * All fragmented traffic. * All traffic with IP options. * Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). * TCP RST packets, when the "Spoofed Reset Protection" feature is activated. * When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. * Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: * Connections that cannot be discriminated ONLY by the source port cannot be templated. * NATed traffic cannot be templated. * VPN traffic cannot be templated. * Complex connections (FTP, H323, SQL, etc.) cannot be templated. * Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. * The following rules will prevent a Connection Template from being created. * All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): * Rule with service 'Any' (resolved in R75.40 and above) * Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). * Rules with the following objects: * Time object * Port range object (resolved in R75.40 and above) * Dynamic object * Domain object * Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). * Rules with RPC/DCOM/DCE-RPC services. * Rules with Client Authentication or Session Authentication. * When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. 460 459 2014-05-16T02:23:54Z Nighthawk 1 wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 Rate this document [1=Worst,5=Best] Solution == Traffic acceleration: == When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: * The first packets of any new TCP session, unless a "template" exists. * The first packet of any new UDP session. * All traffic that matches a service that uses a Resource. * Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). * All traffic that is supposed to be dropped or rejected, according to the rule base. * All traffic that matches a rule, whose source or destination is the Security Gateway itself. * All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). * All traffic that matches a rule with User Authentication or Session Authentication. * Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). * CIFS traffic. * IPv6 traffic. * All multicast traffic. * All fragmented traffic. * All traffic with IP options. * Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). * TCP RST packets, when the "Spoofed Reset Protection" feature is activated. * When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. * Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: * Connections that cannot be discriminated ONLY by the source port cannot be templated. * NATed traffic cannot be templated. * VPN traffic cannot be templated. * Complex connections (FTP, H323, SQL, etc.) cannot be templated. * Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. * The following rules will prevent a Connection Template from being created. * All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): * Rule with service 'Any' (resolved in R75.40 and above) * Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). * Rules with the following objects: * Time object * Port range object (resolved in R75.40 and above) * Dynamic object * Domain object * Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). * Rules with RPC/DCOM/DCE-RPC services. * Rules with Client Authentication or Session Authentication. * When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. 459 458 2014-05-16T02:19:21Z Nighthawk 1 /* Traffic acceleration: */ wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 Rate this document [1=Worst,5=Best] Solution == Traffic acceleration: == When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: * The first packets of any new TCP session, unless a "template" exists. * The first packet of any new UDP session. * All traffic that matches a service that uses a Resource. * Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). * All traffic that is supposed to be dropped or rejected, according to the rule base. * All traffic that matches a rule, whose source or destination is the Security Gateway itself. * All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). * All traffic that matches a rule with User Authentication or Session Authentication. * Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). * CIFS traffic. * IPv6 traffic. * All multicast traffic. * All fragmented traffic. * All traffic with IP options. * Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). * TCP RST packets, when the "Spoofed Reset Protection" feature is activated. * When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. * Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: Connections that cannot be discriminated ONLY by the source port cannot be templated. NATed traffic cannot be templated. VPN traffic cannot be templated. Complex connections (FTP, H323, SQL, etc.) cannot be templated. Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. The following rules will prevent a Connection Template from being created. All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): Rule with service 'Any' (resolved in R75.40 and above) Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). Rules with the following objects: Time object Port range object (resolved in R75.40 and above) Dynamic object Domain object Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). Rules with RPC/DCOM/DCE-RPC services. Rules with Client Authentication or Session Authentication. When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. 458 2014-05-16T02:17:50Z Nighthawk 1 Created page with " == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 Rate t..." wikitext text/x-wiki == SecureXL Mechanism == Solution ID: sk32578 Product: SecureXL Version: All Platform / Model: All Date Created: 15-Feb-2007 Last Modified: 26-Mar-2014 Rate this document [1=Worst,5=Best] Solution == Traffic acceleration: == <nowiki> When SecureXL is enabled, all traffic should be accelerated, except traffic that matches the following conditions: The first packets of any new TCP session, unless a "template" exists. The first packet of any new UDP session. All traffic that matches a service that uses a Resource. Certain traffic that matches a service that is inspected by a SmartDefense/IPS or Web Intelligence feature. For example, traffic on which SSH protections are activated is not accelerated. For more details, refer to sk42401 (Factors that adversely affect performance in SecureXL). All traffic that is supposed to be dropped or rejected, according to the rule base. All traffic that matches a rule, whose source or destination is the Security Gateway itself. All traffic that matches a rule with a Security Server (e.g., Authenication, Anti-Virus, URL Filtering, Anti-Spam). All traffic that matches a rule with User Authentication or Session Authentication. Non-TCP/UDP/GRE/ESP traffic (including ICMP traffic). CIFS traffic. IPv6 traffic. All multicast traffic. All fragmented traffic. All traffic with IP options. Connections that will be matched for ISP Redundancy (inbound/outbound interface is one of the interfaces configured for ISP Redundancy). TCP RST packets, when the "Spoofed Reset Protection" feature is activated. When using ClusterXL in Load Sharing mode with 'Sticky Decision Function'. Traffic that violates stateful inspection paradigm, or that is suspected to be spoofed. </nowiki> '''Connection establishment acceleration ("templates" mechanism):''' In order to enhance connection establishment acceleration, a mechanism attempts to "group together" all connections that match a particular service and whose sole discriminating element is the Source Port. This type of "grouping" enables even the very first packets of a TCP handshake to be accelerated. This is very useful on short connections, in which the percentage of TCP handshake traffic is very high. The very first packets of the first connection on the same service will be forwarded to the Security Gateway's kernel, which will then create a "template" of the connection and notify the SecureXL device. Any subsequent TCP connections established on the same service (where only the source port is different) will already be accelerated (as well as any other traffic, of course). There are several conditions that will prevent a template from being created: Connections that cannot be discriminated ONLY by the source port cannot be templated. NATed traffic cannot be templated. VPN traffic cannot be templated. Complex connections (FTP, H323, SQL, etc.) cannot be templated. Non-TCP/Non-UDP traffic (including ICMP traffic) cannot be templated. The following rules will prevent a Connection Template from being created. All subsequent rules below such rules will not be templated as well, regardless of the rule. It is advised that all rules that can be templated, be placed at the top of the rule base (unless of course, this will violate other optimization considerations): Rule with service 'Any' (resolved in R75.40 and above) Rule with a service that has a 'handler' (where a specific protocol is chosen in 'Protocol Type' field - instead of 'None' ; go to service object - right-click - Edit... - Advanced... - Protocol Type:). Rules with the following objects: Time object Port range object (resolved in R75.40 and above) Dynamic object Domain object Rules with "complex" services (i.e., services that have anything specified in the "Match" field, or "Enable reply from any port" of their "Advanced" section or Source Port is defined). Rules with RPC/DCOM/DCE-RPC services. Rules with Client Authentication or Session Authentication. When SYN Attack (SYN Defender), or Small PMTU features are activated in SmartDefense/IPS. Setting the fwd daemon cpu affinity 0 200 605 2016-10-25T01:36:24Z Nighthawk 1 Created page with "Performance Tuning Administration Guide R77 Allocating a Core for Heavy Logging If the gateway is performing heavy logging, it may be advisable to allocate a processing core ..." wikitext text/x-wiki Performance Tuning Administration Guide R77 Allocating a Core for Heavy Logging If the gateway is performing heavy logging, it may be advisable to allocate a processing core to the fwd daemon, which performs the logging. Like adding a core for the SND, this too will reduce the number of cores available for kernel instances. To allocate a processing core to the fwd daemon, you need to do two things: 1. Reduce the number of kernel instances using cpconfig 2. Set the fwd daemon affinity, as detailed below. Setting the fwd Daemon Affinity Check which processing cores are running the kernel instances and which cores are handling interface traffic using... fw ctl affinity -l -r Allocate the remaining core(with nothing assigned to it) to the fwd daemon by setting the fwd daemon affinity to that core create fwaffinity.conf in $FWDIR/conf and add a line as follows: n fwd <cpuid> where <cpuid> is the number of the processing core to be set as the affinity of the fwd daemon 7d04e7da3337ba65a30b99ebcb7c65da5a2b3b71 Splat add route cli 0 54 59 2013-04-12T16:34:50Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki adding routes to secureplatform via command line / cli Example: ip route add 2.1.1.0/24 via 194.29.42.179 make permanent to survive reboot route --save [[category:check point]] Splat password reset 0 57 62 2013-04-16T15:37:46Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == secure platform password reset / recovery procedure (tested) == 1. boot to system recovery CD or other linux live CD / usb 2. mount root partition mkdir /mnt/sda6 mount /dev/sda6 /mnt/sda6 3. change root chroot /mnt/sda6 /bin/bash 4. reset admin account password (assuming it is active) /usr/bin/passwd admin 5. reset expert password /bin/expert_password [[category:check point]] Splat scp 0 55 60 2013-04-12T16:35:10Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki add user account to /etc/scpusers change shell to bash for the user chsh -s /bin/bash <username> [[category:check point]] Ssh tunnel scratch 0 56 707 61 2018-01-24T16:25:04Z Nighthawk 1 wikitext text/x-wiki == reverse tunnel on a check point splat / secureplatform R75.40 device== the ssh client is older (openssh-3.6.1p2-33.30.39cp) and less functional. Doesn't support a remote bind address [Expert@chkpfw]# ssh --help ... -R listen-port:host:port Forward remote port to local address more descriptive translation of the line above -R remote_host_listen-port:localhost_ip:localhost_port Example command: ssh -f -N -R 10022:192.168.1.1:22 username@192.168.1.1 where remote_host = 192.168.1.1 compared to OpenSSH_6.1p1-hpn13v11, we can see the remote bind address option below in modern openssh implementation that is missing. man ssh ... -R '''[bind_address:]'''port:host:hostport [[category:ssh]] 7ed4f4fa7c9df7446c28f1a03ed3eb40e6d75ebf 61 2013-04-12T16:39:08Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == reverse tunnel on a check point splat / secureplatform R75.40 device== the ssh client is older (openssh-3.6.1p2-33.30.39cp) and less functional. Doesn't support a remote bind address [Expert@chkpfw]# ssh --help ... -R listen-port:host:port Forward remote port to local address Example command: ssh -f -N -R 10022:192.168.1.1:22 username@192.168.1.1 compared to OpenSSH_6.1p1-hpn13v11, we can see the remote bind address option below in modern openssh implementation that is missing. man ssh ... -R '''[bind_address:]'''port:host:hostport [[category:ssh]] Static NAT for outgoing connections through gateway with ISP Redundancy 0 228 716 2018-02-11T17:55:11Z Nighthawk 1 Created page with "[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25152&partition=Advanced&product=Security sk25152]" wikitext text/x-wiki [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk25152&partition=Advanced&product=Security sk25152] 70f908700481e102b8b8a694833510e7f4e04c68 Useful firewall one liners 0 97 162 2013-07-10T16:00:08Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == state sync sent/rec packets check == fw ctl pstat | grep -A 1 "Sync p" | awk '{print $1,$2,$3}' fw ctl pstat | grep -A 1 "Sync packets sent" | grep total | awk '{print $3}' | awk -F , '{print $1}' fw ctl pstat | grep -A 1 "Sync packets received" | grep total | awk '{print $3}' | awk -F , '{print $1}' == VRRP == get VRIDs clish -c "show vrrp interfaces" | grep VRID | tr -d '\n' ; echo "" == nokia validation == '''Interfaces''' ssh -l username desthostname "/bin/ifconfig -a | grep broadcast | grep -v vrrpmac" | awk '{ i = NF-2; print $i }' '''Routes on ipso 6.x (remote command from jumpbox)''' ssh -l username firewall_name "netstat -rn | grep user | sort -n" | awk '{print $1, $4,$8}' '''Route on ipso 4.x''' ssh -l username firewall_name "netstat -rn | grep iCSU | sort -n" | awk '{print $1, $2,$6}' '''routes ''' cat /config/active | grep "default:gateway:address" '''grab active interfaces only''' clish -c "show interfaces" | grep -B 1 On | grep Interface|awk '{print $3}' grab active interfaces and produce clish commands for '''logical interface''' stats clish -c "show interfaces" | grep -B 1 On | grep Interface | grep -v loop | grep -v Tunnel | awk '{print "clish -c \"show interface "$3, "statistics\" |grep -C 1 Bytes;"}' grab active interfaces and produce clish commands for '''physical interface''' stats unfiltered clish -c "show interfaces" | grep -B 1 Up | grep Interface | grep -v loop | grep -v Tunnel | awk '{print "clish -c \"show interface "$3, "statistics\" ;"}' error check clish -c "show interfaces" | grep -B 1 Up | grep Interface | grep -v loop | grep -v Tunnel | awk '{print "clish -c \"show interface "$3, "statistics\" |grep -A 3 Errors;"}' '''VRRP verfication''' vrrp pre-upgrade recon script that looks for any foreign vrrp advertisement ??? == MDS commands == Customer list - useful for determining mdscmd startcma/stopcma first parameter (not given by mdsstat) mdsquerydb Customers ''' list firewall logs, sorted with backslash for copy/paste into gzip command''' # '''ls -t *.log |awk '{print $1,"\\"}'|sort -n|more''' [[category:check point]] asg policy - command 0 263 880 879 2023-10-20T21:40:28Z Nighthawk 1 Nighthawk moved page [[asg policy - manpage]] to [[asg policy - command]] without leaving a redirect wikitext text/x-wiki ==asg policy== ==Description== Use the "asg policy" command in GaiaClosed gClish or the Expert mode to perform policy-related actions. ==Syntax== asg policy -h<br> asg policy {verify | verify_amw} [-vs <VS IDs>] [-a] [-v]<br> asg policy unload [--disable_pnotes] [-a]<br> asg policy unload --ip_forward a490b9582b1aba43b91595705187bf000d0b0603 879 878 2023-10-20T21:40:12Z Nighthawk 1 wikitext text/x-wiki ==asg policy== ==Description== Use the "asg policy" command in GaiaClosed gClish or the Expert mode to perform policy-related actions. ==Syntax== asg policy -h<br> asg policy {verify | verify_amw} [-vs <VS IDs>] [-a] [-v]<br> asg policy unload [--disable_pnotes] [-a]<br> asg policy unload --ip_forward a490b9582b1aba43b91595705187bf000d0b0603 878 877 2023-10-20T21:39:36Z Nighthawk 1 /* Syntax */ wikitext text/x-wiki asg policy ==Description== Use the "asg policy" command in GaiaClosed gClish or the Expert mode to perform policy-related actions. ==Syntax== asg policy -h<br> asg policy {verify | verify_amw} [-vs <VS IDs>] [-a] [-v]<br> asg policy unload [--disable_pnotes] [-a]<br> asg policy unload --ip_forward 7224c14b535fbe8208ba9eb232bb6fc64cb99319 877 2023-10-20T21:39:11Z Nighthawk 1 Created page with "asg policy ==Description== Use the "asg policy" command in GaiaClosed gClish or the Expert mode to perform policy-related actions. ==Syntax== asg policy -h asg policy {v..." wikitext text/x-wiki asg policy ==Description== Use the "asg policy" command in GaiaClosed gClish or the Expert mode to perform policy-related actions. ==Syntax== asg policy -h asg policy {verify | verify_amw} [-vs <VS IDs>] [-a] [-v] asg policy unload [--disable_pnotes] [-a] asg policy unload --ip_forward 4fd964ab301b6d73d091c48489a76e24d070917f big-ip notes 0 271 926 925 2024-12-09T17:55:37Z Nighthawk 1 wikitext text/x-wiki ==links== [https://community.f5.com/kb/codeshare/big-ip-upgrade-procedure-using-cli-vcmp-guest--host/280685 BIG-IP Upgrade Procedure Using CLI (vCMP Guest & Host)] [https://networkproguide.com/f5-big-ip-cli-commands-cheat-sheet/ Big-ip cheat sheet] [[category:f5]] bf0b3a6e96b427a34b852c035e5545bdf7e9e5e3 925 2024-10-04T19:06:57Z Nighthawk 1 Created page with "==links== [https://community.f5.com/kb/codeshare/big-ip-upgrade-procedure-using-cli-vcmp-guest--host/280685 BIG-IP Upgrade Procedure Using CLI (vCMP Guest & Host)] category..." wikitext text/x-wiki ==links== [https://community.f5.com/kb/codeshare/big-ip-upgrade-procedure-using-cli-vcmp-guest--host/280685 BIG-IP Upgrade Procedure Using CLI (vCMP Guest & Host)] [[category:f5]] a337338e08fb0c663f6624d5f21c009da68c90ec centos 3.8 rpm repo 0 104 304 188 2013-11-05T10:16:26Z Nighthawk 1 wikitext text/x-wiki centos 3.8 RPMs are compatible with most SecurePlatform versions. Specifically, these have been tested with R75.30. To check SPLAT version run... [Expert@secureplaform]# '''cat /etc/cp-release''' Check Point SecurePlatform R75.30 '''downloads''' an ancient but still working yum repo [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ centos 3.8 i386 (32 bit) RPMs] [[category:sysadmin]] 188 2013-07-19T15:51:42Z Nighthawk 1 Created page with "centos 3.8 RPMs are compatible with most SecurePlatform versions. Specifically, these have been tested with R75.30. To check SPLAT version run... [Expert@secureplaform]# ''..." wikitext text/x-wiki centos 3.8 RPMs are compatible with most SecurePlatform versions. Specifically, these have been tested with R75.30. To check SPLAT version run... [Expert@secureplaform]# '''cat /etc/cp-release''' Check Point SecurePlatform R75.30 '''downloads''' [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ centos 3.8 i386 (32 bit) RPMs] [[category:sysadmin]] centos 6.5 repo 0 213 662 2017-05-25T00:30:52Z Nighthawk 1 Nighthawk moved page [[centos 6.5 repo]] to [[centos 6.5 repo yum file]] wikitext text/x-wiki #REDIRECT [[centos 6.5 repo yum file]] cd9a95b5d68db574cd22a90867881c070118e496 centos 6.5 repo yum file 0 212 661 660 2017-05-25T00:30:52Z Nighthawk 1 Nighthawk moved page [[centos 6.5 repo]] to [[centos 6.5 repo yum file]] wikitext text/x-wiki <br>[rhel-source] <br>name=Red Hat Enterprise Linux $releasever - $basearch - Source <br>baseurl=ftp://ftp.redhat.com/pub/redhat/linux/enterprise/$releasever/en/os/SRPMS/ <br>enabled=0 <br>gpgcheck=1 <br>gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release <br> <br>[rhel-source-beta] <br>name=Red Hat Enterprise Linux $releasever Beta - $basearch - Source <br>baseurl=ftp://ftp.redhat.com/pub/redhat/linux/beta/$releasever/en/os/SRPMS/ <br>enabled=0 <br>gpgcheck=1 <br>gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta,file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release <br> <br>[CentOS6base] <br>name=CentOS-6-Base <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=os <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY=CentOS-6 <br> <br>[CentOS6updates] <br>name=CentOS-6-Updates <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=updates <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 <br> <br>[CentOS6plus] <br>name=CentOS-6-Plus <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=centosplus <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 238ebcd3415b3b24f48636248784f27d321343df 660 659 2017-05-24T22:34:28Z Nighthawk 1 wikitext text/x-wiki <br>[rhel-source] <br>name=Red Hat Enterprise Linux $releasever - $basearch - Source <br>baseurl=ftp://ftp.redhat.com/pub/redhat/linux/enterprise/$releasever/en/os/SRPMS/ <br>enabled=0 <br>gpgcheck=1 <br>gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release <br> <br>[rhel-source-beta] <br>name=Red Hat Enterprise Linux $releasever Beta - $basearch - Source <br>baseurl=ftp://ftp.redhat.com/pub/redhat/linux/beta/$releasever/en/os/SRPMS/ <br>enabled=0 <br>gpgcheck=1 <br>gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta,file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release <br> <br>[CentOS6base] <br>name=CentOS-6-Base <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=os <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY=CentOS-6 <br> <br>[CentOS6updates] <br>name=CentOS-6-Updates <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=updates <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 <br> <br>[CentOS6plus] <br>name=CentOS-6-Plus <br>mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=centosplus <br>gpgcheck=1 <br>enabled=1 <br>gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 238ebcd3415b3b24f48636248784f27d321343df 659 2017-05-24T22:28:41Z Nighthawk 1 Created page with "[rhel-source] name=Red Hat Enterprise Linux $releasever - $basearch - Source baseurl=ftp://ftp.redhat.com/pub/redhat/linux/enterprise/$releasever/en/os/SRPMS/ enabled=0 gpgche..." wikitext text/x-wiki [rhel-source] name=Red Hat Enterprise Linux $releasever - $basearch - Source baseurl=ftp://ftp.redhat.com/pub/redhat/linux/enterprise/$releasever/en/os/SRPMS/ enabled=0 gpgcheck=1 gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release [rhel-source-beta] name=Red Hat Enterprise Linux $releasever Beta - $basearch - Source baseurl=ftp://ftp.redhat.com/pub/redhat/linux/beta/$releasever/en/os/SRPMS/ enabled=0 gpgcheck=1 gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta,file:///etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release [CentOS6base] name=CentOS-6-Base mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=os gpgcheck=1 enabled=1 gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY=CentOS-6 [CentOS6updates] name=CentOS-6-Updates mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=updates gpgcheck=1 enabled=1 gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 [CentOS6plus] name=CentOS-6-Plus mirrorlist=http://mirrorlist.centos.org/?release=6&arch=$basearch&repo=centosplus gpgcheck=1 enabled=1 gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-6 e584843d802e9f4c8231e1402fc1b61009c69c63 check jumbo hotfix install status 0 189 847 604 2020-09-12T16:27:49Z Nighthawk 1 wikitext text/x-wiki # cpinfo -y all ===R77=== # installed_jumbo_take 2a0b195d1358233b705051882c88097a2922f1a5 604 571 2016-10-14T21:39:32Z Nighthawk 1 wikitext text/x-wiki # installed_jumbo_take # cpinfo -y all 685081d96f5adfef1922d586deb2526cdeeb5a1d 571 2016-02-12T22:39:58Z Nighthawk 1 Created page with " # installed_jumbo_take" wikitext text/x-wiki # installed_jumbo_take check point appliance documentation 0 166 457 2014-05-13T04:57:50Z Nighthawk 1 Created page with " sk96246 [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk96246&js_peid=P-114a7bc3b09-10006&partition=General&p..." wikitext text/x-wiki sk96246 [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk96246&js_peid=P-114a7bc3b09-10006&partition=General&product=Security Check Point Appliances Documentation] checking ICA / SIC certificate expiration date 0 15 19 18 2013-02-25T22:52:06Z Nighthawk 1 moved [[Check point CA certificate expiration]] to [[checking ICA / SIC certificate expiration date]] wikitext text/x-wiki How to list the expiration dates for objects managed by and MDS or CMA cpca_client lscert [[category:check point]] 18 2013-02-25T22:51:25Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki How to list the expiration dates for objects managed by and MDS or CMA cpca_client lscert [[category:check point]] checkpoint.com platform document page 0 256 849 2021-01-13T22:14:19Z Nighthawk 1 Created page with "[https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowprelanding=&id=1 Downloads & Documentation Next Generation Firewalls]" wikitext text/x-wiki [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowprelanding=&id=1 Downloads & Documentation Next Generation Firewalls] b6ddc409aa9287a7ce3b17084dec14ae18d3229e cisco asa notes 0 267 919 913 2024-06-24T18:54:53Z Nighthawk 1 wikitext text/x-wiki ==Getting Started== ===Accessing the Appliance Command-Line Interface=== This following prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode. hostname> To access privileged EXEC mode, enter the following command: hostname> '''enable''' The prompt changes to the following: hostname# To exit privileged mode, enter the disable, exit, or quit command. access global configuration mode hostname# '''configure terminal''' The prompt changes to the following: hostname(config)# ===configure base system=== set firewall mode to transparent or routed? (Optional) example config... can paste on command line over console ASA Version 9.18.4 ! console serial interface management0/0 nameif management security-level 100 ip address 192.168.100.254 255.255.255.0 no shutdown interface gigabitethernet0/0 nameif inside security-level 100 ip address 10.100.0.254 255.255.255.0 no shutdown interface gigabitethernet0/1 nameif outside security-level 0 ip address 172.16.100.254 255.255.255.0 no shutdown http server enable http 192.168.100.0 255.255.255.0 management crypto key generate rsa modulus 1024 username admin password admin ssh 192.168.100.0 255.255.255.0 management aaa authentication ssh console LOCAL save config hostname(config)# '''write memory''' ==VM notes== KVM graphical console stops after... Booting the kernel. at this point he VM is outputing to the virtual serial console. There are similar experiences on VMware. dbe4f7adac4808ce432dde729899a064aa2f211a 913 912 2024-06-20T04:41:25Z Nighthawk 1 wikitext text/x-wiki ==Getting Started== ===Accessing the Appliance Command-Line Interface=== This following prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode. hostname> To access privileged EXEC mode, enter the following command: hostname> '''enable''' The prompt changes to the following: hostname# To exit privileged mode, enter the disable, exit, or quit command. access global configuration mode hostname# '''configure terminal''' The prompt changes to the following: hostname(config)# ===configure base system=== set firewall mode to transparent or routed? (Optional) example config... can paste on command line over console ASA Version 9.18.4 ! console serial interface management0/0 nameif management security-level 100 ip address 192.168.100.254 255.255.255.0 no shutdown interface gigabitethernet0/0 nameif inside security-level 100 ip address 10.100.0.254 255.255.255.0 no shutdown interface gigabitethernet0/1 nameif outside security-level 0 ip address 172.16.100.254 255.255.255.0 no shutdown http server enable http 192.168.100.0 255.255.255.0 management crypto key generate rsa modulus 1024 username admin password admin ssh 192.168.100.0 255.255.255.0 management aaa authentication ssh console LOCAL save config hostname(config)# '''write memory''' bff335ccf853db41e4dfacf0a522eafc197c26ea 912 2024-06-20T03:16:13Z Nighthawk 1 Created page with "==Getting Started== Accessing the Appliance Command-Line Interface This following prompt indicates that you are in user EXEC mode. Only basic commands are available from user..." wikitext text/x-wiki ==Getting Started== Accessing the Appliance Command-Line Interface This following prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode. hostname> To access privileged EXEC mode, enter the following command: hostname> '''enable''' The prompt changes to the following: hostname# To exit privileged mode, enter the disable, exit, or quit command. access global configuration mode hostname# '''configure terminal''' The prompt changes to the following: hostname(config)# 951b17cf29ee36ba972f7d5593b7c44896284916 clish - Adding / Deleting routes 0 86 139 138 2013-05-24T15:33:40Z Nighthawk 1 wikitext text/x-wiki from clish prompt... > set static-route 172.21.0.0/16 nexthop gateway address 10.10.10.1 on to delete use off instead of on [[category:check point]] [[category:nokia]] [[category:clish]] 138 2013-05-24T15:33:15Z Nighthawk 1 Created page with " set static-route 172.21.0.0/16 nexthop gateway address 10.10.10.1 on to delete use off instead of on [[category:check point]] [[category:nokia]] [[category:clish]]" wikitext text/x-wiki set static-route 172.21.0.0/16 nexthop gateway address 10.10.10.1 on to delete use off instead of on [[category:check point]] [[category:nokia]] [[category:clish]] clish - adding an IP address to an existing logical interface 0 77 121 118 2013-05-24T15:10:03Z Nighthawk 1 wikitext text/x-wiki == adding an IP address to an existing logical interface: == *** you must leave off the enable keyword when the logical interface already exists. NokiaIP390:31> add interface eth-s1p1c0 address 192.168.1.2/23 [[category:nokia]] [[category:clish]] 118 117 2013-05-24T13:30:43Z Nighthawk 1 wikitext text/x-wiki == adding an IP address to an existing logical interface: == *** you must leave off the enable keyword when the logical interface already exists. add interface eth-s1p1c0 address 192.168.1.2/23 [[category:nokia]] [[category:clish]] 117 2013-05-24T13:30:14Z Nighthawk 1 Created page with "== adding an IP address to an existing logical interface: == *** you must leave off the enable keyword when the logical interface already exists. add interface eth-s1p1c0 a..." wikitext text/x-wiki == adding an IP address to an existing logical interface: == *** you must leave off the enable keyword when the logical interface already exists. add interface eth-s1p1c0 address 192.168.1.2/23 clish - get vrrp vird 0 79 126 125 2013-05-24T15:18:44Z Nighthawk 1 wikitext text/x-wiki just get the vrid... # '''clish -c "show vrrp interfaces" | grep -m1 -E "VRID"''' VRID 71 here is a nice oneliner for checking vrrp status and grabbing the VRID without flooding you screen.... '''clish -c "show vrrp interfaces" | grep -E "VRID|Base|State"''' Example... # '''clish -c "show vrrp interfaces" | grep -E "VRID|Base|State"''' VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937734 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 [[category:check point]] [[category:nokia]] [[category:clish]] 125 124 2013-05-24T15:18:30Z Nighthawk 1 wikitext text/x-wiki just get the vrid... # '''clish -c "show vrrp interfaces" | grep -m1 -E "VRID"''' VRID 71 here is a nice oneliner for checking vrrp status and grabbing the VRID without flooding you screen.... clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" Example... # '''clish -c "show vrrp interfaces" | grep -E "VRID|Base|State"''' VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937734 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 [[category:check point]] [[category:nokia]] [[category:clish]] 124 123 2013-05-24T15:18:07Z Nighthawk 1 wikitext text/x-wiki just get the vrid... # clish -c "show vrrp interfaces" | grep -m1 -E "VRID" VRID 71 here is a nice oneliner for checking vrrp status and grabbing the VRID without flooding you screen.... clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" Example... # clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937734 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 [[category:check point]] [[category:nokia]] [[category:clish]] 123 2013-05-24T15:13:31Z Nighthawk 1 Created page with "here is a nice oneliner for checking vrrp status and grabbing the VRID without flooding you screen.... clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" Example......" wikitext text/x-wiki here is a nice oneliner for checking vrrp status and grabbing the VRID without flooding you screen.... clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" Example... # clish -c "show vrrp interfaces" | grep -E "VRID|Base|State" VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937734 BasePriority: 90 Effective Priority: 90 VRID 71 State: Backup Time since transition: 8937735 BasePriority: 90 Effective Priority: 90 [[category:check point]] [[category:nokia]] [[category:clish]] clish - manual vrrp failover via CLI 0 80 128 127 2013-05-24T15:20:56Z Nighthawk 1 wikitext text/x-wiki '''clish, command line, manual vrrp failover''' *** works on simplified vrrp which has only one vrid. To determine if simplified is used run(from shell): # clish -c "show vrrp interfaces" | grep VRID ...if only one VRID is returned, then it is simplified vrrp. run from clish > set mcvr vrid <1-255> priority <1-254> [[category:check point]] [[category:nokia]] [[category:clish]] 127 2013-05-24T15:20:02Z Nighthawk 1 Created page with "'''clish, command line, manual vrrp failover''' *** works on simplified vrrp which has only one vrid. To determine if simplified is used run: clish -c "show vrrp interfaces" ..." wikitext text/x-wiki '''clish, command line, manual vrrp failover''' *** works on simplified vrrp which has only one vrid. To determine if simplified is used run: clish -c "show vrrp interfaces" | grep VRID ...if only one VRID is returned, then it is simplified vrrp. set mcvr vrid <1-255> priority <1-254> [[category:check point]] [[category:nokia]] [[category:clish]] clish - set default gateway 0 76 122 116 2013-05-24T15:10:18Z Nighthawk 1 wikitext text/x-wiki '''Set default gateway''' NokiaIP390:31> set static-route default nexthop gateway address 192.168.1.254 priority 1 on [[category:nokia]] [[category:clish]] 116 2013-05-24T13:29:11Z Nighthawk 1 Created page with "'''Set default gateway''' set static-route default nexthop gateway address 192.168.1.254 priority 1 on [[category:nokia]] [[category:clish]]" wikitext text/x-wiki '''Set default gateway''' set static-route default nexthop gateway address 192.168.1.254 priority 1 on [[category:nokia]] [[category:clish]] clish - set user password 0 88 142 141 2013-05-24T15:35:59Z Nighthawk 1 moved [[nokia - set user password]] to [[clish - set user password]] wikitext text/x-wiki reset user password > set user username passwd <enter> or > set user username newpass <password> <enter> [[category:check point]] [[category:nokia]] [[category:clish]] 141 2013-05-24T15:35:49Z Nighthawk 1 Created page with "reset user password > set user username passwd <enter> or > set user username newpass <password> <enter> [[category:check point]] [[category:nokia]] [[category:clish]]" wikitext text/x-wiki reset user password > set user username passwd <enter> or > set user username newpass <password> <enter> [[category:check point]] [[category:nokia]] [[category:clish]] clish - unlock user account 0 90 607 144 2016-11-08T01:03:27Z Nighthawk 1 wikitext text/x-wiki > set user johnsmith lock-out off [[category:check point]] [[category:nokia]] [[category:clish]] de950cfb1abb3235078f45a28d4a0fab18773e6f 144 2013-05-24T15:37:11Z Nighthawk 1 Created page with " > set user swrxadmin lock-out off [[category:check point]] [[category:nokia]] [[category:clish]]" wikitext text/x-wiki > set user swrxadmin lock-out off [[category:check point]] [[category:nokia]] [[category:clish]] cmm notes 0 150 419 2014-04-15T17:05:37Z Nighthawk 1 Created page with "FRU = Field Replaceable Unit [[category:cmm]] [[category:61000]]" wikitext text/x-wiki FRU = Field Replaceable Unit [[category:cmm]] [[category:61000]] cp manpage - mdsenv runcrossdomainquery 0 211 641 2017-05-01T17:38:53Z Nighthawk 1 Created page with "usage: mdscmd runcrossdomainquery <-f Domain_list_filename | -list Domain1,Domain2,... | -all> < <query_network_obj <-n exact_name | -c partial_name | -i IP> > | <query_r..." wikitext text/x-wiki usage: mdscmd runcrossdomainquery <-f Domain_list_filename | -list Domain1,Domain2,... | -all> < <query_network_obj <-n exact_name | -c partial_name | -i IP> > | <query_rulebase -n global_obj_name> | <whereused_rules -n global_obj_name> | <whereused_objs -n global_obj_name> > | <query_generic_obj -t table -s query_str>> 455d0909975e084ced7abf5fc2b009f72fd54c12 cplic db print examples 0 99 168 2013-07-16T16:33:10Z Nighthawk 1 Created page with "The following command will display all licenses and what they are attached to. [Expert@mds1]# '''cplic db_print -all -a attached''' Retrieving license information from datab..." wikitext text/x-wiki The following command will display all licenses and what they are attached to. [Expert@mds1]# '''cplic db_print -all -a attached''' Retrieving license information from database ...<br> The following licenses appear in the database: =============================================== Host Expiration Features 192.168.1.9 never CPPR-CMA-U-NGX CPMP-DBVR-U-NGX CPMP-CXL-HA-U-NGX CK-098B4CBAE171 test2-cma 192.168.1.251 never CPSB-DMN-U CK-378752BCF761 test2-cma_sec 192.168.1.3 never cppr-lcu-ngx cpsb-base CK-41E193480370 test2-clm viewing unattached licenses [Expert@mds1]# '''cplic db_print -all -a attached | grep -E "CK-............ $"''' Retrieving license information from database ...<br> 192.168.1.2 never CPVP-VEE-U-3DES-MGMT-NGX CPMP-DBVR-U-NGX CK-148894B9345D 192.168.1.2 never CPVP-VFM-U-3DES-NGX CPVP-VPS-1-NGX FW1:6.0:MC_ALL_2 FW1:6.0:MULTICORE CK-A9E475B8766F 192.168.1.2 never CPFW-FM-U-NGX CPMP-PPK-1-NGX CK-B13E10987C39 [[category:licensing]] [[category:smartupdate]] cpmiquerybin 0 27 733 696 2018-03-27T14:48:00Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' <br>list all objects of type cluster member cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br> list the member of a particular cluster cpmiquerybin attr "" network_objects "name='<name_of_cluster_here>'" -a cluster_members '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''All IPs and masks of group's members''' GROUPNAME="<group name>"; cpmiquerybin object "" network_objects "name='$GROUPNAME'" | grep ":Name" | awk '{print $2}' | tr -d '()' | while read line; do IPADDRESS=`cpmiquerybin attr "" network_objects "name='$line'" -a ipaddr | tr -d '\t';`; MASK=`cpmiquerybin attr "" network_objects "name='$line'" -a netmask`; CIDR=`/usr/local/bin/mask2cidr $MASK`; echo "$IPADDRESS/$MASK"; done List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" network_objects "hosted_by_mds='<mds_name>'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_member')" -a __name__ == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 1561b915552b5eca23cd87cab7fc06070038fa16 696 681 2017-10-05T19:24:53Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' <br>list all objects of type cluster member cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br> list the member of a particular cluster cpmiquerybin attr "" network_objects "name='<name_of_cluster_here>'" -a cluster_members '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''All IPs and masks of group's members''' GROUPNAME="<group name>"; cpmiquerybin object "" network_objects "name='$GROUPNAME'" | grep ":Name" | awk '{print $2}' | tr -d '()' | while read line; do IPADDRESS=`cpmiquerybin attr "" network_objects "name='$line'" -a ipaddr | tr -d '\t';`; MASK=`cpmiquerybin attr "" network_objects "name='$line'" -a netmask`; CIDR=`/usr/local/bin/mask2cidr $MASK`; echo "$IPADDRESS/$MASK"; done List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" network_objects "hosted_by_mds='<mds_name>'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_member')" == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 5da0ad5094c7cd0cdd33874ed170573f1b2578ca 681 680 2017-08-23T05:39:09Z Nighthawk 1 /* indentify firewall objects */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' <br>list all objects of type cluster member cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br> list the member of a particular cluster cpmiquerybin attr "" network_objects "name='<name_of_cluster_here>'" -a cluster_members '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''All IPs and masks of group's members''' GROUPNAME="<group name>"; cpmiquerybin object "" network_objects "name='$GROUPNAME'" | grep ":Name" | awk '{print $2}' | tr -d '()' | while read line; do IPADDRESS=`cpmiquerybin attr "" network_objects "name='$line'" -a ipaddr | tr -d '\t';`; MASK=`cpmiquerybin attr "" network_objects "name='$line'" -a netmask`; CIDR=`/usr/local/bin/mask2cidr $MASK`; echo "$IPADDRESS/$MASK"; done List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" network_objects "hosted_by_mds='<mds_name>'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 941881b05c041a80fdb33b76adde602eaa642dd2 680 668 2017-08-22T15:51:14Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''All IPs and masks of group's members''' GROUPNAME="<group name>"; cpmiquerybin object "" network_objects "name='$GROUPNAME'" | grep ":Name" | awk '{print $2}' | tr -d '()' | while read line; do IPADDRESS=`cpmiquerybin attr "" network_objects "name='$line'" -a ipaddr | tr -d '\t';`; MASK=`cpmiquerybin attr "" network_objects "name='$line'" -a netmask`; CIDR=`/usr/local/bin/mask2cidr $MASK`; echo "$IPADDRESS/$MASK"; done List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" network_objects "hosted_by_mds='<mds_name>'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] a94d0a11b77a139b9a653c341ff80698d5120a34 668 626 2017-07-04T04:05:10Z Nighthawk 1 wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''All IPs and masks of group's members''' GROUPNAME="<group name>"; cpmiquerybin object "" network_objects "name='$GROUPNAME'" | grep ":Name" | awk '{print $2}' | tr -d '()' | while read line; do IPADDRESS=`cpmiquerybin attr "" network_objects "name='$line'" -a ipaddr | tr -d '\t';`; MASK=`cpmiquerybin attr "" network_objects "name='$line'" -a netmask`; CIDR=`/usr/local/bin/mask2cidr $MASK`; echo "$IPADDRESS/$MASK"; done List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] fbcaf8de9654f488851b16377fe28ebcf6452a07 626 625 2017-04-16T22:11:10Z Nighthawk 1 /* indentify firewall objects */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ '''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) '''cluster members''' cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ '''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 359c59326f845398c0e9d10fd0629cef31715323 625 624 2017-04-16T22:10:58Z Nighthawk 1 /* indentify firewall objects */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ <br>'''clusters''' CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) <br>'''cluster members''' cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br>'''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 1491b1dba688d37b02f1da78eac8628da40e803a 624 623 2017-04-16T22:09:58Z Nighthawk 1 /* indentify firewall objects */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' <br>cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ <br>'''clusters''' <br>CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) <br>'''cluster members''' <br>cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br>'''identify clusters and standalone firewalls (excluding cluster members)''' cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 4b6e06de568c52b268274d1786374937d63a06d8 623 622 2017-04-16T21:57:49Z Nighthawk 1 /* indentify firewall objects */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' <br>cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ <br>'''clusters''' <br>CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) <br>'''cluster members''' <br>cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br>'''identify clusters and standalone firewalls (excluding cluster members)''' <br><pre> cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name</pre> cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] ca5809e3a73d71a71d73ae009b5b01e2d7238c21 622 621 2017-04-16T21:55:21Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == indentify firewall objects == '''Standalone Firewalls''' <br>cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ <br>'''clusters''' <br>CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) <br>'''cluster members''' <br>cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ <br>'''identify clusters and standalone firewalls (excluding cluster members)''' <br>cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 7e969aa7f9f01dd812a51d4640f7302b54622d8c 621 613 2017-04-16T21:53:01Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' Standalone Firewalls <br>cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ clusters <br>CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members <br>cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ identify clusters or standalone firewalls <br>cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] ceff2f02ddc5965105b83d05c8aeed5b3902fcbc 613 594 2017-04-12T14:35:04Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) identify clusters or standalone firewalls cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal') | (type='gateway') & (location='internal')" -a __name__,svn_version_name cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] a2a5f4135e8018b0db7235330299d1b5b1dcb0e1 594 593 2016-07-15T20:51:10Z Nighthawk 1 /* CMA queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard (it does contain rule UIDs unlike dbedit output) cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] bf1f47a25b7a14c00b8fc50d5f497c4fef0601f9 593 575 2016-07-15T20:50:37Z Nighthawk 1 /* CMA queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets print raw dump of a policy named Standard cpmiquerybin object "" fw_policies "name='##Standard'" dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 8d6b7d95cbcc8461227127e4307cfd3e08e24da9 575 557 2016-03-16T16:46:45Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "(type='gateway_cluster') | (type='gateway') | (type='cluster_members')" *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 557 543 2015-07-17T17:08:54Z Nighthawk 1 /* CMA queries */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ get CMA list of policy collections (similar to above) cpmiquerybin attr "" policies_collections "" -a __name__ get installable targets for a policy named standard cpmiquerybin attr "" policies_collections "name='Standar'" -a __name__,installable_targets dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 543 371 2014-10-07T15:23:23Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects (and store them in bash variable)''' Standalone Firewalls GATEWAYS=( `cpmiquerybin attr "" network_objects "(type='gateway') & (location='internal')" -a __name__ | tr '\n' ' '` ) clusters CLUSTERS=( `cpmiquerybin attr "" network_objects "(type='gateway_cluster') & (location='internal')" -a __name__ | tr '\n' ' '` ) cluster members MEMBERS=( `cpmiquerybin attr "" network_objects "(type='cluster_member') | (type='gateway') & (location='internal')" -a __name__ | tr '\n ' ' '` ) cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 371 370 2014-03-15T20:28:36Z Nighthawk 1 moved [[Cpmiquerybin]] to [[cpmiquerybin]] wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 370 327 2014-03-15T20:28:01Z Nighthawk 1 wikitext text/x-wiki cpmiquerybin is found on Provider-1 installations only. If you want to use it on a SmartCenter server, follow this guide [http://www.cpwiki.net/index.php/cpmiquerybin_on_SmartCenter_server cpmiquerybin on SmartCenter server] == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 327 318 2014-01-12T06:52:22Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces fw="xxx"; cpmiquerybin object "" network_objects "name='$fw'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 318 317 2013-11-19T17:19:16Z Nighthawk 1 /* cma global properties */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install | sed -n 's/.*(\([^ ]*\))/\1/p' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 317 315 2013-11-19T17:19:00Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == cma global properties == individual parameters are not available by name. You have to dump them all and grep for what you want. cpmiquerybin object "" properties "name='firewall_properties'" example - cma auto sync rules / objects on policy save global setting: cpmiquerybin object "" properties "name='firewall_properties'" |grep auto_sync_on_install == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 315 300 2013-11-17T08:39:16Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin attr "" network_objects "type='gateway_cluster'" -a __name__ cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 300 299 2013-11-01T17:00:18Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin object "" network_objects "type='gateway_cluster'" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 299 279 2013-11-01T16:59:05Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin object "" network_objects "type='gateway_cluster'" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' cpmiquerybin object "" network_objects "name='$GROUP_NAME'" | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 279 277 2013-09-28T06:34:52Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'" cpmiquerybin object "" network_objects "type='gateway_cluster'" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members anti-spoofing check on all firewall interfaces cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 277 276 2013-09-26T20:33:19Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|anti_spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|anti_spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ *** not sure how well the one above works... == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 276 243 2013-09-26T20:32:16Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|anti_spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|anti_spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr == CMA queries == List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ get secondary CMA cpmiquerybin attr "" network_objects "(primary_management='false') & (management='true')" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 243 159 2013-09-14T05:54:51Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|anti_spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|anti_spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 159 158 2013-07-06T17:58:36Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 158 157 2013-07-04T00:17:15Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "(log_server='true') & (management='false')" -a __name__,ipaddr ***note*** above is example of a compound query get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 157 95 2013-07-03T21:43:24Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == '''indentify firewall objects''' cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 95 86 2013-05-16T20:14:41Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' get list of firewalls / cp devices cpmiquerybin attr "mdsdb" network_objects "cp_products_installed='true'" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 86 85 2013-04-28T04:24:12Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 85 75 2013-04-28T04:23:58Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "" network_objects "type='gateway_cluster'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 75 74 2013-04-21T07:47:47Z Nighthawk 1 /* MDS queries */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm \ | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; \ if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; \ if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 74 73 2013-04-21T07:46:32Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr List CLMs / log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 73 72 2013-04-21T07:44:54Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 72 71 2013-04-21T07:44:29Z Nighthawk 1 wikitext text/x-wiki == Usage == '''cpmiquerybin''' <query_result_type> <database> <table> <query> [-a <attributes_list>]''' == jumbled examples == cpmiquerybin object "" network_objects "type='cluster_member'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 71 70 2013-04-21T07:40:37Z Nighthawk 1 wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ list CMAs cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ dump MDS admin account info cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm same as above plus formatting cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 70 69 2013-04-21T07:36:28Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr dump and format Provider-1 admins cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 69 68 2013-04-21T05:47:27Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='cluster_name'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='group_name'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 68 64 2013-04-21T05:45:53Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members from cluster object name''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' or cpmiquerybin attr "" network_objects "name='KEBNC2SPB01_02_Cluster'" -a cluster_members '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='glb_IPBlock-12-69889'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 64 63 2013-04-20T23:52:58Z Nighthawk 1 /* jumbled examples */ wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members by parsing the cluster objects''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='glb_IPBlock-12-69889'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ List log servers from CMA env (lists CMAs too usually) cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 63 31 2013-04-20T23:52:07Z Nighthawk 1 wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "" network_objects "log_server='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members by parsing the cluster objects''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='glb_IPBlock-12-69889'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] 31 2013-02-26T00:29:49Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == Usage == #'''cpmiquerybin''' <query_result_type> <database> <ta ble> <query> [-a <attributes_list>] {| cellspacing="5" border="1" ! align="left"|command ! <query_result_type> ! <database> ! <t able> ! <query> ! [-a <attribute_list>] ! description |- |cpmiquerybin |attr |"mdsdb" |row 1, col 4 |row 1, col 5 |row 1, col 6 |- |cpmiquerybin |row 2, col 2 |row 2, col 3 |row 2, col 4 |row 2, col 5 |row 2, col 6 |- |cpmiquerybin |row 3, col 2 |row 3, col 3 |row 3, col 4 |row 3, col 5 |row 3, col 6 |- !Total | |15.00 |} == jumbled examples == cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm cpmiquerybin object "" network_objects "type='gateway'"|grep -E ":name|spoof" cpmiquerybin object "mdsdb" pv1_administrators "" cpmiquerybin attr "mdsdb" network_objects "management='true'" -a __name__,ipaddr cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__,auth_method,msp_perm | awk '{ printf $1 ","; for (i=2; i<NF; i++) printf $i; printf ","; if ($NF==80000000) print "Provider-1 Superuser"; if ($NF==40000000) print "Customer Superuser"; if ($NF==20000000) print "Global Manageer"; if ($NF==10000000) print "Customer Manager"; if ($NF==00000000) print "None"; } ' '''get name of all objects of type cluster member''' cpmiquerybin attr "" network_objects "type='cluster_member'" -a __name__ '''To get a list of names of all VALID cluster members by parsing the cluster objects''' cpmiquerybin object "" network_objects "" |grep -A 12 cluster_members |grep Name | awk -F "(" '{printf $2}' | sed -e 's/)/|/g' '''query all objects for an ip address''' cpmiquerybin attr "" network_objects "ipaddr='192.168.1.2'" -a __name__,ipaddr from cma env, list management/cma objects # cpmiquerybin attr "" network_objects "management='true'" -a __name__,ipaddr '''All members of a group''' cpmiquerybin object "" network_objects "name='group_name_goes_here'" | grep ":Name" '''All members of a group formatted''' cpmiquerybin object "" network_objects "name='glb_IPBlock-12-69889'" | grep ":Name" | awk -F "(" '{print $2}' | sed -e 's/)//' List services with 'Match for Any' ticked cpmiquerybin attr "" services "include_in_any='true'" -a __name__ == MDS queries == list all MDSs cpmiquerybin attr "mdsdb" mdss "" -a __name__ list primary MDS cpmiquerybin attr "mdsdb" mdss "primary='true'" -a __name__ get IP for CLM name cpmiquerybin attr "mdsdb" network_objects "name='clm_name_goes_here'" -a __name__,ipaddr get CMA policy names cpmiquerybin attr "" fw_policies "" -a __name__ == Tables == queryable tables can be gleaned from tables.C cat tables.C |grep ": (" == Default Queries for mdsquerydb== mdsquerydb is utilizes cpmiquerybin. The table below defines all the queries it uses. It is included here as a reference for cpmiquerybin. $MDSDIR/conf/queries.conf # (c) Copyright 1993-2005 Check Point Software Technologies Ltd. # All rights reserved. # # This is proprietary information of Check Point Software Technologies # Ltd., which is provided for informational purposes only and for use # solely in conjunction with the authorized use of Check Point Software # Technologies Ltd. products. The viewing and use of this information is # subject, to the extent appropriate, to the terms and conditions of the # license agreement that authorizes the use of the relevant product. # # This configuration file is a part of Provider-1/SiteManager-1 Database Query Tool # # each line in queries.conf is: # $1 - query environment [ MDS | CMA | ANY ] # $2 - dbname # $3 - key # $4 - display format [ attr | object ] # $5 - tablename # $6 - query # $7 - fields to be printed # CMA "" NetworkObjects attr network_objects "" __name__,type # Get name and type of all network objects MDS "" GlobalNetworkObjects attr network_objects "" __name__,type # Get name and type of all global network objects MDS "mdsdb" NetworkObjects attr network_objects "" __name__,type # Get all customers' internal Check Point installed network objects MDS "mdsdb" Customers attr pv1_customers "" __name__ # Get names of all PV-1 Customers MDS "mdsdb" Administrators attr pv1_administrators "" __name__ # Get names of all PV-1 Administrators MDS "mdsdb" MDSs attr mdss "" __name__,ipaddr # Get names and IPs of all MDSs MDS "mdsdb" CMAs attr network_objects "management='true'" __name__ # Get names of all CMAs CMA "" Gateways attr network_objects "type='gateway'" __name__,ipaddr # Get names and IPs of all gateways MDS "mdsdb" GuiClients attr pv1_guiclients "" __name__,ipaddr # Get names and IPs of all gui clients CMA "" Status attr statuses "" __name__ CMA "" Policies object fw_policies "" [[category:check point]] cpmiquerybin on SmartCenter server 0 141 376 375 2014-03-15T20:45:07Z Nighthawk 1 /* set environment variables */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# '''source $CPDIR/tmp/.CPprofile.sh ''' == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/bashrc function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} source it... [Expert@ckkpmgr]# '''source /etc/bashrc''' The function above redirects stderr to stdout and filters out the error message string. Use the function '''cpquery''' at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. another test run... [Expert@ckkpmgr]# '''cpquery attr "" network_objects "name='LocalMachine'" -a __name__''' LocalMachine no more error! [[category:cpmi]] 375 374 2014-03-15T20:44:56Z Nighthawk 1 /* use a function to filter out get_cust_name error */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/bashrc function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} source it... [Expert@ckkpmgr]# '''source /etc/bashrc''' The function above redirects stderr to stdout and filters out the error message string. Use the function '''cpquery''' at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. another test run... [Expert@ckkpmgr]# '''cpquery attr "" network_objects "name='LocalMachine'" -a __name__''' LocalMachine no more error! [[category:cpmi]] 374 373 2014-03-15T20:44:47Z Nighthawk 1 /* use a function to filter out get_cust_name error */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/bashrc function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} source it... [Expert@ckkpmgr]# source /etc/bashrc The function above redirects stderr to stdout and filters out the error message string. Use the function '''cpquery''' at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. another test run... [Expert@ckkpmgr]# '''cpquery attr "" network_objects "name='LocalMachine'" -a __name__''' LocalMachine no more error! [[category:cpmi]] 373 372 2014-03-15T20:35:19Z Nighthawk 1 /* use a function to filter out get_cust_name error */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} The function above redirects stderr to stdout and filters out the error message string. Use the function '''cpquery''' at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. another test run... [Expert@ckkpmgr]# '''cpquery attr "" network_objects "name='LocalMachine'" -a __name__''' LocalMachine no more error! [[category:cpmi]] 372 369 2014-03-15T20:34:04Z Nighthawk 1 /* use a function to filter out get_cust_name error */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. another test run... [Expert@ckkpmgr]# '''cpquery attr "" network_objects "name='LocalMachine'" -a __name__''' LocalMachine no more error! [[category:cpmi]] 369 368 2014-03-15T20:24:40Z Nighthawk 1 wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. [[category:cpmi]] 368 367 2014-03-15T20:23:57Z Nighthawk 1 /* set environment variables */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. 367 366 2014-03-15T20:23:37Z Nighthawk 1 /* set environment variables */ wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh, replace the 192.168.1.10 with whatever your SmartCenter IP address is. MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh or logout / login == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. 366 365 2014-03-15T20:22:44Z Nighthawk 1 wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. == set environment variables == add the following lines to $CPDIR/tmp/.CPprofile.sh MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR source it to make them take effect... [Expert@ckkpmgr]# source $CPDIR/tmp/.CPprofile.sh or logout / login == successful test run == [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. == use a function to filter out get_cust_name error == add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. 365 2014-03-15T20:20:04Z Nighthawk 1 Created page with "cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE..." wikitext text/x-wiki cpmiquerybin is a useful tool found on Check Point Provider-1 servers. Ever wish you had it on a SmartCenter? Well, you can. Copy the cpmiquerybin from a Provider-1 (OF THE SAME Check Point VERSION) to your SmartCenter. set environment variables add the following lines to $CPDIR/tmp/.CPprofile.sh MSP_SOMEIP_ADDR="192.168.1.10"; export MSP_SOMEIP_ADDR MDSDIR="/opt/CPshrd-R75.40"; export MDSDIR [Expert@ckkpmgr]# '''source $CPDIR/tmp/.CPprofile.sh''' successful test run [Expert@ckkpmgr]# '''cpmiquerybin attr "" network_objects "name='LocalMachine'" -a __name__''' get_cust_name: couldn't find /customers/ within fwdir LocalMachine The error concerning the customers dir is annoying. I tried to make some dummy dirs to fake it out... mkdir /opt/CPsuite-R75.40/fw1/customers mkdir /opt/CPsuite-R75.40/fw1/customers/dummy mkdir /opt/CPshrd-R75.40/customers mkdir /opt/CPshrd-R75.40/customers/dummy but it didn't work... so, best to use a function. add a global function to /etc/profile function cpquery() { /usr/local/bin/cpmiquerybin "$@" 2>&1 | grep -v "get_cust_name: couldn't find";} then, use the function cpquery at the shell command line in place of cpmiquerybin. You aren't supposed to use aliases in scripts, maybe you can use the global function? or you can define the function in all your scripts. cpstat examples 0 195 589 588 2016-06-15T04:43:29Z Nighthawk 1 wikitext text/x-wiki [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f policy fw Product name: Firewall Policy name: Standard Policy install time: Fri Jun 10 15:31:13 2016 Num. connections: 11 Peak num. connections: 35 Connections capacity limit: 0 Total accepted packets: 5566405 Total dropped packets: 0 Total rejected packets: 0 Total accepted bytes: 3426062164 Total dropped bytes: 0 Total rejected bytes: 0 Total logged: 8518 Interface table ------------------------------------ |Name|Dir|Accept |Drop |Reject|Log | ------------------------------------ | eth0|in |3276782| 4894| 0|7379| | eth0|out|1376700| 1| 0| 1| |eth1|in | 872610| 6836| 0|1056| |eth1|out| 25708| 0| 0| 0| |eth2|in | 14461| 0| 0| 0| |eth2|out| 143| 0| 0| 0| ------------------------------------ | | |5566404|11731| 0|8436| ------------------------------------ [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 ha Product name: High Availability Version: N/A Status: OK HA installed: 1 Working mode: Sync only (OPSEC) HA started: yes [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 blades Packets accepted : 5567773 Packets dropped : 0 Peak number of connections: 35 Number of connections: 9 Top Rule Hits ----------------------- |rule index|rule count| ----------------------- |Rule 0 | 15251| |Rule 3 | 6139| |Rule 5 | 1311| |Rule 1 | 6| ----------------------- [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f log_connection fw Corrupted reply: Columns are not of same length. [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f multi_cpu os Processors load --------------------------------------------------------------------------------- |CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec| --------------------------------------------------------------------------------- | 1| 1| 1| 98| 2| ?| 4098| | 2| 0| 1| 99| 1| ?| 4098| | 3| 6| 2| 93| 7| ?| 4098| | 4| 0| 0| 99| 1| ?| 4099| --------------------------------------------------------------------------------- [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f connectivity os Connectivity to User Center: - [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f perf os Total Virtual Memory (Bytes): 4201517056 Active Virtual Memory (Bytes): 335167488 Total Real Memory (Bytes): 985444352 Active Real Memory (Bytes): 335093760 Free Real Memory (Bytes): 650350592 Memory Swaps/Sec: - Memory To Disk Transfers/Sec: - CPU User Time (%): 0 CPU System Time (%): 1 CPU Idle Time (%): 99 CPU Usage (%): 1 CPU Queue Length: - CPU Interrupts/Sec: 996 CPUs Number: 4 Disk Servicing Read\Write Requests Time: - Disk Requests Queue: - Disk Free Space (%): 66 Disk Total Free Space (Bytes): 8332877824 Disk Available Free Space (Bytes): 7688634368 Disk Total Space (Bytes): 12481380352 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f sync fw sync - configured: Yes sync - out state: On sync - in state: On sync - number of sent packets: 114550 sync - number of Kbytes sent: 27052 sync - number of packets received: 93019 sync - number of Kbytes received: 56304 sync - number of retrans requests sent: 0 sync - number of retrans requests received: 0 sync - number of ack packets sent: 3 sync - number of ack packets received: 3 sync - number of packets dropped by network: 0 sync - overall number of table updates to be synced: 553440 sync - number of updates filtered by 'non sync': 262792 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f inspect fw Product name: Firewall inspect - packets: 0 inspect - operations: 0 inspect - lookups: 0 inspect - record: 0 inspect - extract: 0 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f sensors os 205e7f9cfa4457b9ca28e2a92dc972a364c386db 588 2016-06-15T04:40:36Z Nighthawk 1 Created page with " [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f policy fw Product name: Firewall Policy name: Standard Policy install time: Fri Jun 10 1..." wikitext text/x-wiki [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f policy fw Product name: Firewall Policy name: Standard Policy install time: Fri Jun 10 15:31:13 2016 Num. connections: 11 Peak num. connections: 35 Connections capacity limit: 0 Total accepted packets: 5566405 Total dropped packets: 0 Total rejected packets: 0 Total accepted bytes: 3426062164 Total dropped bytes: 0 Total rejected bytes: 0 Total logged: 8518 Interface table ------------------------------------ |Name|Dir|Accept |Drop |Reject|Log | ------------------------------------ |eth0|in |3276782| 4894| 0|7379| |eth0|out|1376700| 1| 0| 1| |eth1|in | 872610| 6836| 0|1056| |eth1|out| 25708| 0| 0| 0| |eth2|in | 14461| 0| 0| 0| |eth2|out| 143| 0| 0| 0| ------------------------------------ | | |5566404|11731| 0|8436| ------------------------------------ [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 ha Product name: High Availability Version: N/A Status: OK HA installed: 1 Working mode: Sync only (OPSEC) HA started: yes [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 blades Packets accepted : 5567773 Packets dropped : 0 Peak number of connections: 35 Number of connections: 9 Top Rule Hits ----------------------- |rule index|rule count| ----------------------- |Rule 0 | 15251| |Rule 3 | 6139| |Rule 5 | 1311| |Rule 1 | 6| ----------------------- [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f log_connection fw Corrupted reply: Columns are not of same length. [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f multi_cpu os Processors load --------------------------------------------------------------------------------- |CPU#|User Time(%)|System Time(%)|Idle Time(%)|Usage(%)|Run queue|Interrupts/sec| --------------------------------------------------------------------------------- | 1| 1| 1| 98| 2| ?| 4098| | 2| 0| 1| 99| 1| ?| 4098| | 3| 6| 2| 93| 7| ?| 4098| | 4| 0| 0| 99| 1| ?| 4099| --------------------------------------------------------------------------------- [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f connectivity os Connectivity to User Center: - [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f perf os Total Virtual Memory (Bytes): 4201517056 Active Virtual Memory (Bytes): 335167488 Total Real Memory (Bytes): 985444352 Active Real Memory (Bytes): 335093760 Free Real Memory (Bytes): 650350592 Memory Swaps/Sec: - Memory To Disk Transfers/Sec: - CPU User Time (%): 0 CPU System Time (%): 1 CPU Idle Time (%): 99 CPU Usage (%): 1 CPU Queue Length: - CPU Interrupts/Sec: 996 CPUs Number: 4 Disk Servicing Read\Write Requests Time: - Disk Requests Queue: - Disk Free Space (%): 66 Disk Total Free Space (Bytes): 8332877824 Disk Available Free Space (Bytes): 7688634368 Disk Total Space (Bytes): 12481380352 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f sync fw sync - configured: Yes sync - out state: On sync - in state: On sync - number of sent packets: 114550 sync - number of Kbytes sent: 27052 sync - number of packets received: 93019 sync - number of Kbytes received: 56304 sync - number of retrans requests sent: 0 sync - number of retrans requests received: 0 sync - number of ack packets sent: 3 sync - number of ack packets received: 3 sync - number of packets dropped by network: 0 sync - overall number of table updates to be synced: 553440 sync - number of updates filtered by 'non sync': 262792 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f inspect fw Product name: Firewall inspect - packets: 0 inspect - operations: 0 inspect - lookups: 0 inspect - record: 0 inspect - extract: 0 [Expert@chkpmgr3:0]# cpstat -h 192.168.175.2 -f sensors os 3401dc7a2aff9d450e84bc64cb28dcd119ebdc76 cpuse deployment agent 0 206 885 824 2023-10-23T23:01:54Z Nighthawk 1 /* how do perform and offline upgrades */ wikitext text/x-wiki ==checking current version== # '''cpvinfo $DADIR/bin/DAService | grep -A 4 -E "Name = DeploymentAgent"''' Module Name = DeploymentAgent Build Number = 747 Major Release = NGX Minor Release = cpuse_geyser_ga Release Number = 5.0.5 ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92449&partition=General&product=All%22 sk92449] on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. *** note: it is typical to see the above message many times == restarting clishd== To Stop [Expert@HostName]# '''tellpm process:clishd''' <br>To Start [Expert@HostName]# '''tellpm process:clishd t''' start agent # clish -c "installer agent start" upgrade should be completed. 74c5282cc70fc0a2d7f2d6eee2e0eba523fd94d4 824 715 2018-10-02T12:49:06Z Nighthawk 1 wikitext text/x-wiki ==checking current version== # '''cpvinfo $DADIR/bin/DAService | grep -A 4 -E "Name = DeploymentAgent"''' Module Name = DeploymentAgent Build Number = 747 Major Release = NGX Minor Release = cpuse_geyser_ga Release Number = 5.0.5 ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92449&partition=General&product=All%22 sk92449] on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# '''tellpm process:clishd''' <br>To Start [Expert@HostName]# '''tellpm process:clishd t''' start agent # clish -c "installer agent start" upgrade should be completed. 2ffcafdd404a05e51e21d63cd68c3189e8c893a4 715 657 2018-02-06T15:50:50Z Nighthawk 1 wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92449&partition=General&product=All%22 sk92449] on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# '''tellpm process:clishd''' <br>To Start [Expert@HostName]# '''tellpm process:clishd t''' start agent # clish -c "installer agent start" upgrade should be completed. 2639e8515d7ff51024a5d52f8bc8e9323393531f 657 650 2017-05-24T03:39:25Z Nighthawk 1 /* restarting clishd */ wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# '''tellpm process:clishd''' <br>To Start [Expert@HostName]# '''tellpm process:clishd t''' start agent # clish -c "installer agent start" upgrade should be completed. 5a2f3944af0028ddc5ed10763e2baed7f0475f78 650 649 2017-05-05T01:54:54Z Nighthawk 1 /* restarting clishd */ wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# '''tellpm process:clishd''' <br>To Start [Expert@HostName]# '''tellpm process:clishd t''' work in progress... 029d0865da4dbd2ce9a39d21d72922486d562c1d 649 648 2017-05-05T01:49:10Z Nighthawk 1 /* how do perform and offline upgrades */ wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# '''rpm -e CPda-00-00''' /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# '''rpm -ivh ./CPda-00-00.i386.rpm''' Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... 53d8e5e5aaadb90d3e2b6ad19834e48617ac960b 648 647 2017-05-05T01:48:00Z Nighthawk 1 Nighthawk moved page [[cpuse agent]] to [[cpuse deployment agent]] without leaving a redirect wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... fe1edb26883d14847f18060cc7453bf1bea7498a 647 646 2017-05-05T01:47:48Z Nighthawk 1 /* downloading the latest cpuse */ wikitext text/x-wiki ==downloading the latest cpuse deployment agent== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... fe1edb26883d14847f18060cc7453bf1bea7498a 646 645 2017-05-05T01:45:20Z Nighthawk 1 /* check currently installed version */ wikitext text/x-wiki ==downloading the latest cpuse== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep Build ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... b0a2958beb56bcfbcbbf2219552da32f667f7d19 645 630 2017-05-05T01:42:10Z Nighthawk 1 wikitext text/x-wiki ==downloading the latest cpuse== a download link to the latest cpuse is found in sk92449 on the user center ==check currently installed version== cpvinfo $DADIR/bin/DAService | grep build number ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... dade76e542d536218321cf7eb991b89fdcdc5a78 630 629 2017-04-26T17:26:11Z Nighthawk 1 wikitext text/x-wiki ==get currently installed version== cpvinfo $DADIR/bin/DAService | grep build number ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. == restarting clishd== To Stop [Expert@HostName]# tellpm process:clishd <br>To Start [Expert@HostName]# tellpm process:clishd t work in progress... 8341af373b9cf797cfcdf8436de80216ef9d8a15 629 2017-04-25T15:15:08Z Nighthawk 1 Created page with " ==get currently installed version== cpvinfo $DADIR/bin/DAService | grep build number ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse ..." wikitext text/x-wiki ==get currently installed version== cpvinfo $DADIR/bin/DAService | grep build number ==how do perform and offline upgrades== # download the latest cpuse # uninstall cpuse [Expert@chkpmds1:0]# rpm -e CPda-00-00 /opt/CPshrd-R77/bin/cpwd_admin del -name DASERVICE cpwd_admin: successful Del operation # install new cpuse Expert@chkpmds1:0]# rpm -ivh ./CPda-00-00.i386.rpm Preparing... ########################################### [100%] cpwd_admin: Process DASERVICE isn't monitored by cpWatchDog. Stop request aborts Trying to stop DAService for 60 seconds - please wait... Error: DAService is not running. <br>Waiting for DAService to stop... Error: DAService is not running. work in progress... 22a8590b70aab0719bb9806f71ae5497d6131ff8 cpuse deployment agent logging 0 264 887 886 2023-10-24T02:18:00Z Nighthawk 1 wikitext text/x-wiki <br><br>tail -f /opt/CPInstLog/DeploymentAgent.log 43827e2c38dafb168c36111261b06a15952dbf56 886 2023-10-24T02:16:41Z Nighthawk 1 Created page with "tail -f /opt/CPInstLog/DeploymentAgent.log" wikitext text/x-wiki tail -f /opt/CPInstLog/DeploymentAgent.log 51b0e30c0046b0f8172e044563cdde97fc9d256a cpuse notes 0 249 832 831 2019-07-18T15:40:43Z Nighthawk 1 wikitext text/x-wiki [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk92449&partition=General&product=All%22 sk92449 - Check Point Upgrade Service Engine (CPUSE) - Gaia Deployment Agent] log file /opt/CPInstLog/DeploymentAgent.log 7aacf8c3a6ef2e4ffe83abd49ecd826060b423a4 831 2019-07-18T15:18:31Z Nighthawk 1 Created page with " log file /opt/CPInstLog/DeploymentAgent.log" wikitext text/x-wiki log file /opt/CPInstLog/DeploymentAgent.log 0e31d9c72b8920f40d7603645314c8ee760b6349 cpview log 0 190 860 859 2021-04-15T17:37:29Z Nighthawk 1 /* exporting the data */ wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' ===check for high cpu (77.20?)=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,name_of_cpu,cpu_usage from fw_counters where cpu_usage between "90" and "100" ' == cpu table == $ sqlite3 /var/log/CPView_history/CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); ==exporting the data== [Expert@chkpfw1:0]# '''cpview history export''' Stopping the history daemon cpwd_admin: Process HISTORYD terminated cpwd_admin: successful Del operation Exporting the database Exported DB to /var/log/CPView_history/exported_db_15_04_2021_1222.gz Starting the history daemon cpwd_admin: Process HISTORYD started successfully (pid=9595) to view the oldest date and time of data available in a history file... [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time from fw_counters limit 1' 2021-04-07 05:32:28 c817da399ba5647eb08674211243666af31582da 859 717 2021-04-15T17:35:55Z Nighthawk 1 wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' ===check for high cpu (77.20?)=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,name_of_cpu,cpu_usage from fw_counters where cpu_usage between "90" and "100" ' == cpu table == $ sqlite3 /var/log/CPView_history/CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); ==exporting the data== [Expert@chkpfw1:0]# '''cpview history export''' Stopping the history daemon cpwd_admin: Process HISTORYD terminated cpwd_admin: successful Del operation Exporting the database Exported DB to /var/log/CPView_history/exported_db_15_04_2021_1222.gz Starting the history daemon cpwd_admin: Process HISTORYD started successfully (pid=9595) 453203226fc8e6e36b4f353535574a73a7c7e10b 717 606 2018-03-01T15:20:24Z Nighthawk 1 /* check for high cpu */ wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' ===check for high cpu (77.20?)=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,name_of_cpu,cpu_usage from fw_counters where cpu_usage between "90" and "100" ' == cpu table == $ sqlite3 /var/log/CPView_history/CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); 268601b5f7c5eddcd2f11640b93db5f3347796a6 606 603 2016-10-25T01:46:36Z Nighthawk 1 /* query with start end times */ wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' ===check for high cpu=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,name_of_cpu,cpu_usage from fw_counters where cpu_usage between "90" and "100" ' == cpu table == $ sqlite3 /var/log/CPView_history/CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); 63fd7dee8d8325da30856e4a58f2a2f5a188974f 603 587 2016-10-04T18:15:03Z Nighthawk 1 /* cpu table */ wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' == cpu table == $ sqlite3 /var/log/CPView_history/CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); 70355017f4c78f9dfc71dd9f6f5ee86815f0c845 587 584 2016-06-10T13:22:59Z Nighthawk 1 wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' == cpu table == $ sqlite3 ./CPViewDB.dat '.schema UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE' | tr ',' '\n' CREATE TABLE UM_STAT_UM_CPU_UM_CPU_ORDERED_TABLE (Timestamp INTEGER name_of_cpu INTEGER cpu_usage INTEGER cpu_usr_time INTEGER cpu_sys_time INTEGER cpu_idl_time INTEGER cpu_io_wait INTEGER cpu_interrupts INTEGER); 04f64beca90032c5d48fc97f1ac585eace91e3e4 584 574 2016-06-07T13:34:01Z Nighthawk 1 /* versions */ wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' 332189fe81644e9dd9071a1ed8c78989d9492ec4 574 573 2016-02-24T22:10:04Z Nighthawk 1 wikitext text/x-wiki ==versions== R77 and above The table structure can change dramatically from version to version. For example the number of tables in the cpview database changed from 321 to 83 between r77.20 and r77.30. ==opening the database== We will query it with the sqlite3 utility. We don't use the cpview binary because it is too limited. [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat == example queries == === list tables === sqlite> .tables ===list columns=== sqlite> .schema fw_counters ===passing sqlite3 command via CLI=== [Expert@chkpfw1:0]# sqlite3 /var/log/CPView_history/CPViewDB.dat '.tables' ===query with start end times=== sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as time,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where time between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' 573 2016-02-20T16:27:12Z Nighthawk 1 Created page with " == example queries == using sqlite3 sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as loltime,inbound_throughput/1048576/10 as MBS_IN..." wikitext text/x-wiki == example queries == using sqlite3 sqlite3 /var/log/CPView_history/CPViewDB.dat 'select datetime(Timestamp, "unixepoch") as loltime,inbound_throughput/1048576/10 as MBS_IN,outbound_throughput/1048576/10 as MBS_OUT,concurrent_conns from fw_counters where loltime between "2016-01-05 00:00:00" and "2016-01-05 00:10:00"' creating a NON-CPSHELL new user on secureplatform (SPLAT) vi CLI 0 145 407 406 2014-04-05T17:43:21Z Nighthawk 1 wikitext text/x-wiki == THIS PAGE IS UNDER CONSTRUCTION AND INCOMPLETE == I may not finish this page since Gaia has been out so long. The purpose would be to create a secure user account that could login to a bash shell and perform useful O.S. operations. This would be done without root or expert access, and without cpshell restrictions. The user account should be able to perform backup operations and monitoring. Maybe Check Point configurations if we installed the product and granted user group permissions during the install. For creating a more "vanilla" SPLAT cpshell user (the easy way), go here [http://www.cpwiki.net/index.php/creating_a_new_user_on_secureplatform_via_CLI creating a new user on secureplatform via CLI] [[category:user accounts]] == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config to be continued(maybe)... 406 405 2014-04-05T17:42:38Z Nighthawk 1 /* THIS PAGE IS UNDER CONSTRUCTION AND INCOMPLETE */ wikitext text/x-wiki == THIS PAGE IS UNDER CONSTRUCTION AND INCOMPLETE == I may not finish this page since Gaia has been out so long. The purpose would be to create a secure user account that could login to a bash shell and perform useful O.S. operations. This would be done without root or expert access, and without cpshell restrictions. The user account should be able to perform backup operations and monitoring. Maybe Check Point configurations if we installed the product and granted user group permissions during the install. For creating a more "vanilla" SPLAT cpshell user (the easy way), go here [http://www.cpwiki.net/index.php/creating_a_new_user_on_secureplatform_via_CLI creating a new user on secureplatform via CLI] [[category:user accounts]] == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config 405 2014-04-05T17:38:08Z Nighthawk 1 Created page with " == THIS PAGE IS UNDER CONSTRUCTION AND INCOMPLETE == I may not finish this page since Gaia has been out so long. The purpose would be to create a secure user account that c..." wikitext text/x-wiki == THIS PAGE IS UNDER CONSTRUCTION AND INCOMPLETE == I may not finish this page since Gaia has been out so long. The purpose would be to create a secure user account that could login to a bash shell and perform useful O.S. operations. This would be done without root or expert access, and without cpshell restrictions. The user account should be able to perform backup operations and monitoring. Maybe Check Point configurations if we installed the product and granted user group permissions during the install. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config creating a new user on Gaia via CLI 0 130 582 333 2016-05-24T19:59:18Z Nighthawk 1 wikitext text/x-wiki ==version== tested below commands on R75.40 == switch to clish shell == if you aren't here already or are at the expert prompt, just type... [Expert@myfirewall]# clish myfirewall> Clish will give you the > prompt == add user == > add user jsmith uid 0 homedir /home/jsmith (where jsmith should be replace with your username) == set optional parameters == > set user jsmith realname 'john smith' shell /bin/bash gid 100 == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI I don't like setting the user to the root UID, but this is how you get an account with root access. When adding via the web interfaces, it does the same thing. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat" and you get error upon login. example login error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. When adding via the WebUI # cat /etc/passwd|grep jsmith jsmith:x:0:100:john smith:/home/jsmith:/bin/bash [[category:gaia]] e0ef2d80daa77f7dcd4f46bbb751e53458886dd5 333 332 2014-02-17T23:16:14Z Nighthawk 1 /* set access */ wikitext text/x-wiki where jsmith should be replace with your username == switch to clish shell == if you aren't here already or are at the expert prompt, just type... [Expert@myfirewall]# clish myfirewall> Clish will give you the > prompt == add user == > add user jsmith uid 0 homedir /home/jsmith == set optional parameters == > set user jsmith realname 'john smith' shell /bin/bash gid 100 == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI I don't like setting the user to the root UID, but this is how you get an account with root access. When adding via the web interfaces, it does the same thing. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat" and you get error upon login. example login error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. When adding via the WebUI # cat /etc/passwd|grep jsmith jsmith:x:0:100:john smith:/home/jsmith:/bin/bash [[category:gaia]] 332 331 2014-02-17T23:14:02Z Nighthawk 1 wikitext text/x-wiki where jsmith should be replace with your username == switch to clish shell == if you aren't here already or are at the expert prompt, just type... [Expert@myfirewall]# clish myfirewall> Clish will give you the > prompt == add user == > add user jsmith uid 0 homedir /home/jsmith == set optional parameters == > set user jsmith realname 'john smith' shell /bin/bash gid 100 == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. When adding via the WebUI # cat /etc/passwd|grep jsmith jsmith:x:0:100:john smith:/home/jsmith:/bin/bash [[category:gaia]] 331 330 2014-01-30T19:18:37Z Nighthawk 1 /* switch to clish shell */ wikitext text/x-wiki where jsmith should be replace with your username == switch to clish shell == if you aren't here already or are at the expert prompt, just type... [Expert@myfirewall]# clish myfirewall> Clish will give you the > prompt == add user == > add user jsmith uid 1005 homedir /home/jsmith == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == # set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh I will investigate adding the users to the bin group. Also, I will add them to the users group. The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. [[category:gaia]] 330 329 2014-01-30T19:18:12Z Nighthawk 1 wikitext text/x-wiki where jsmith should be replace with your username == switch to clish shell == if you aren't here already or are at the expert prompt, just type... [Expert@myfirewall]# clish myfirewall> == add user == > add user jsmith uid 1005 homedir /home/jsmith == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == # set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh I will investigate adding the users to the bin group. Also, I will add them to the users group. The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. [[category:gaia]] 329 328 2014-01-30T19:15:25Z Nighthawk 1 /* set parameters */ wikitext text/x-wiki where jsmith should be replace with your username == add user == > add user jsmith uid 1005 homedir /home/jsmith == set password == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == # set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh I will investigate adding the users to the bin group. Also, I will add them to the users group. The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. [[category:gaia]] 328 326 2014-01-30T19:12:53Z Nighthawk 1 /* set uid to root */ wikitext text/x-wiki where jsmith should be replace with your username == add user == > add user jsmith uid 1005 homedir /home/jsmith == set parameters == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == # set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied # ls -l /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh -rwxrwx--- 1 admin bin 82 Apr 4 2012 /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh I will investigate adding the users to the bin group. Also, I will add them to the users group. The users group needs to be added to /etc/ssh/sshd_config "AllowedGroups" line. All check point allows there is the root group. Go figure. Sounds insecure to me. [[category:gaia]] 326 325 2013-12-16T18:52:29Z Nighthawk 1 wikitext text/x-wiki where jsmith should be replace with your username == add user == > add user jsmith uid 1005 homedir /home/jsmith == set parameters == > set user jsmith password == set roles == > add rba user jsmith roles adminRole == set access == > add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == # set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied [[category:gaia]] 325 324 2013-12-16T18:12:18Z Nighthawk 1 wikitext text/x-wiki where jsmith should be replace with your username == add user == add user jsmith uid 1005 homedir /home/jsmith == set parameters == set user jsmith password == set roles == add rba user jsmith roles adminRole == set access == add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied [[category:gaia]] 324 2013-12-16T18:11:57Z Nighthawk 1 Created page with "where jsmith should be replace with your username == add user == add user jsmith uid 1005 homedir /home/jsmith == set parameters == set user jsmith password == set rol..." wikitext text/x-wiki where jsmith should be replace with your username == add user == add user jsmith uid 1005 homedir /home/jsmith == set parameters == set user jsmith password == set roles == add rba user jsmith roles adminRole == set access == add rba user jsmith access-mechanisms Web-UI,CLI == set uid to root == set user jsmith uid 0 I don't like setting the user to the root UID. I think Check Point made a mess of the auth permissions as they have in the past. Without setting the root uid above, a user can't run fw commmands like "fw stat". error: /opt/CPshrd-R75.40/tmp/.CPprofile.sh: line 96: /opt/CPcvpn-R75.40/scripts/CVPNprofile.sh: Permission denied [[category:gaia]] creating a new user on secureplatform via CLI 0 101 581 580 2016-05-24T19:57:02Z Nighthawk 1 /* version */ wikitext text/x-wiki ==version== The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of standard linux system file and directory permissions, shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G root -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, you will have be rescrited to commands available inside the cpshell environment. Just type help at the prompt for list of available commands. Run the "expert" command and enter the expert password to gain full priveleges in a bash shell environment. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] b928e5fdba842b93c6c915574fcbc3abf95d743d 580 404 2016-05-24T19:56:33Z Nighthawk 1 wikitext text/x-wiki ==version== R75.40 The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of standard linux system file and directory permissions, shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G root -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, you will have be rescrited to commands available inside the cpshell environment. Just type help at the prompt for list of available commands. Run the "expert" command and enter the expert password to gain full priveleges in a bash shell environment. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 1c692364aa97dda02c1755997773b1e491057b9e 404 403 2014-04-05T17:29:23Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of standard linux system file and directory permissions, shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G root -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, you will have be rescrited to commands available inside the cpshell environment. Just type help at the prompt for list of available commands. Run the "expert" command and enter the expert password to gain full priveleges in a bash shell environment. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 403 402 2014-04-05T17:26:31Z Nighthawk 1 /* test new user account access */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G root -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, you will have be rescrited to commands available inside the cpshell environment. Just type help at the prompt for list of available commands. Run the "expert" command and enter the expert password to gain full priveleges in a bash shell environment. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 402 401 2014-04-05T17:22:03Z Nighthawk 1 /* creating the user account */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G root -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, execute the "expert" command to gain full priveleges. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 401 400 2014-04-05T17:19:28Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, execute the "expert" command to gain full priveleges. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 400 399 2014-04-05T17:18:17Z Nighthawk 1 /* test new user account access */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == Test the account by connecting to the SPLAT device via ssh. After a successful login, execute the "expert" command to gain full priveleges. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 399 398 2014-04-05T17:18:03Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! == test new user account access == test the account by connecting to the SPLAT device via ssh. After a successful login, execute the "expert" command to gain full priveleges. == troubleshooting == If login failures occur, examine /var/log/secure and /var/log/auth files for error messages. [[category:sysadmin]] 398 397 2014-04-05T17:13:48Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == creating the user account == create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith == set the user password == [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 397 396 2014-04-05T17:11:17Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == creating the user account == 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 396 395 2014-04-05T17:08:54Z Nighthawk 1 /* creating the user account */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -o -u 0 -G wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 395 394 2014-04-05T16:59:49Z Nighthawk 1 /* creating the user account */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -g wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 394 393 2014-04-05T16:59:10Z Nighthawk 1 /* add user group to ssh AllowGroups */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== By default, SPLAT only allows members of the root group to ssh in. We will try to be secure and another group to the allowed list. I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 393 392 2014-04-05T16:57:25Z Nighthawk 1 /* creating the user account */ wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 392 323 2014-04-05T16:54:26Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the admin account in expert mode. We will create a regular user account with restricted priveleges in cpshell. Full expert access will be gained by the user by entering expert mode. It is possible to have a regular user with a bash shell. The problem is Check Point makes a mess of file and directory permissions, mangles shell environments, ect... This makes creating such a user more work. That won't be covered here. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@argo]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 323 184 2013-12-16T15:51:54Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. == fix /etc/profile permissions == Check Point screws up the permissions on /etc/profile in SPLAT. In Gaia, it appears to be fixed. Regular users should have read access. Check /etc/profile permissions, if users don't have read access, set it with chmod. [Expert@chkpfw1]# chmod 644 /etc/profile == add user group to ssh AllowGroups== I am being old fashioned, and using the legacy Unix wheel group [Expert@chkpfw1]# sed -i -e 's/AllowGroups root/AllowGroups root wheel/' /etc/ssh/sshd_config == creating the user account == 1) create user account with the standard linux useradd command... [Expert@argo]# useradd -d /home/jsmith -s /bin/cpshell -G wheel -o -u 0 -g wheel -m jsmith 2) set the user password [Expert@chkpfw]# /usr/bin/passwd jsmith New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd jsmith''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 184 183 2013-07-18T21:47:16Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test your login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 183 182 2013-07-18T21:45:41Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd lines before editing john:x:1002:1002::/home/admin:/bin/bash what is should look like after editing john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 182 181 2013-07-18T21:45:06Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. Example /etc/passwd line before editing john:x:1002:1002::/home/admin:/bin/bash (what is should look like after editing) john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 181 180 2013-07-18T21:43:23Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account: [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 180 179 2013-07-18T21:42:22Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> Example of the incorrect way to reset a user password from the root (Expert) account. [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 179 178 2013-07-18T21:41:04Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' New UNIX password: Retype new UNIX password: passwd: all authentication tokens updated successfully. <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 178 177 2013-07-18T21:39:37Z Nighthawk 1 wikitext text/x-wiki The following instructions are performed using the root (Expert) account. 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 177 176 2013-07-18T21:27:45Z Nighthawk 1 wikitext text/x-wiki 1) create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2) set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3) edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4) test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 176 175 2013-07-18T21:27:21Z Nighthawk 1 wikitext text/x-wiki 1 - create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2 - set the user password [Expert@chkpfw]# /usr/bin/passwd ''username'' <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3 - edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4 - test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 175 174 2013-07-18T21:05:08Z Nighthawk 1 wikitext text/x-wiki 1 - create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2 - set the userpassword [Expert@chkpfw]# /usr/bin/passwd ''username'' <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3 - edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell. Failure to set the shell to cpshell will allow the user account root privileges immediately upon login. This would not be secure. john:x:0:0::/home/admin:/bin/cpshell 4 - test you login with ssh. after a successful login, execute the "expert" command to gain root. [[category:sysadmin]] 174 173 2013-07-18T20:57:10Z Nighthawk 1 wikitext text/x-wiki 1 - create user account with the standard linux useradd command... [Expert@chkpfw]# useradd -d /home/''username username'' 2 - set the userpassword [Expert@chkpfw]# /usr/bin/passwd ''username'' <p>*** note *** the full path is required in the above command because Check Point aliases passwd to...</p> alias passwd='/bin/expert_passwd' <p>If you fail to execute the passwd binary by using the full path, you most likely won't be setting the user password, but the expert password... which is actually the password for the root account</p> [Expert@chkpfw]# '''passwd john''' Enter new expert password: <<< if you see this prompt you messed up! 3 - edit /etc/passwd...set UID and GUID to zero and default shell to /bin/cpshell john:x:0:0::/home/admin:/bin/cpshell [[category:sysadmin]] 173 172 2013-07-18T19:12:04Z Nighthawk 1 wikitext text/x-wiki useradd -d /home/''username username'' [[category:sysadmin]] 172 2013-07-18T19:11:06Z Nighthawk 1 Created page with " [[category:sysadmin]]" wikitext text/x-wiki [[category:sysadmin]] cyclic logging deletion mechanism 0 216 671 670 2017-08-07T18:55:54Z Nighthawk 1 wikitext text/x-wiki referenced sk33309 all versions SmartView Tracker Messages / Errors in the traffic log files of the log server (not on the smartcenter or in the fw.adtlog) '''Normal log deletion log''' Type: Control Information field: Log file <name> has been deleted by the "Cyclic Logging" mechanism '''Disk space triggered log deletion that failed''' Type: Alert Information Field: The log repository quota has been exceeded. No file could be deleted. This message indicates that the system tried to delete old log files in order to fulfill the required disk space requirement, as defined by the user, but could not find an appropriate file to delete. This might be because there are no old files left to delete (the active log file cannot be deleted), or because the user configured the mechanism not to delete log files from the last "N" days. The user should delete files manually from the machine in order to reach the desired free disk space. If the user does not, the current log might be deleted when a log switch occurs. d3a3a1e2860ac7f4efc631b13b923eba5ba9ea8a 670 2017-08-07T18:55:20Z Nighthawk 1 Created page with "referenced sk33309 all versions SmartView Tracker Messages / Errors in the traffic log files of the log server (not on the smartcenter or in the fw.adtlog) Information fi..." wikitext text/x-wiki referenced sk33309 all versions SmartView Tracker Messages / Errors in the traffic log files of the log server (not on the smartcenter or in the fw.adtlog) Information field entry.... Normal log deletion log Type: Control Information field: Log file <name> has been deleted by the "Cyclic Logging" mechanism Disk space triggered log deletion that failed Type: Alert Information Field: The log repository quota has been exceeded. No file could be deleted. This message indicates that the system tried to delete old log files in order to fulfill the required disk space requirement, as defined by the user, but could not find an appropriate file to delete. This might be because there are no old files left to delete (the active log file cannot be deleted), or because the user configured the mechanism not to delete log files from the last "N" days. The user should delete files manually from the machine in order to reach the desired free disk space. If the user does not, the current log might be deleted when a log switch occurs. 60fbc6aac7fd8f366ad18e037b01e4d0aacc0fed dbedit firewall object creation 0 64 91 2013-05-10T06:58:30Z Nighthawk 1 Created page with "The following dbedit commands will create a Check Point firewall with a managment IP of 10.30.11.1 and 2 interfaces under the topology. create gateway_ckp ckptestgw modify ..." wikitext text/x-wiki The following dbedit commands will create a Check Point firewall with a managment IP of 10.30.11.1 and 2 interfaces under the topology. create gateway_ckp ckptestgw modify network_objects ckptestgw ipaddr 10.30.11.1 modify network_objects ckptestgw interfaces:1:ifindex 0 addelement network_objects ckptestgw interfaces interface modify network_objects ckptestgw interfaces:0:ipaddr 2.2.2.2 modify network_objects ckptestgw interfaces:0:officialname eth0 addelement network_objects ckptestgw interfaces interface modify network_objects ckptestgw interfaces:1:ifindex 1 modify network_objects ckptestgw interfaces:1:ipaddr 3.3.3.3 modify network_objects ckptestgw interfaces:1:netmask 255.255.255.0 modify network_objects ckptestgw interfaces:1:officialname eth1 [[category:dbedit]] dbedit rule creation 0 62 655 281 2017-05-15T21:50:55Z Nighthawk 1 wikitext text/x-wiki IMPORTANT: first rule for dbedit is rule 0, not 1. also, dbedit counts section headers as rules!!! so, to manipulate a rule # in the SmartDashboard, the formula is SmartDashboard rule # + # of section headers before it -1 + = dbedit rule # add source host1 to rule 1 addelement fw_policies ##Standard rule:1:src:'' network_objects:host1 deleting a rule (untested) dbedit> rmbyindex fw_policies ##Standard rule 10 <br>dbedit> update_all fw_policies::##Standard Updated Successfully [[category:dbedit]] faac5a30afcadf9e828577beaedcbd1fe5b2bf84 281 280 2013-10-04T18:11:14Z Nighthawk 1 wikitext text/x-wiki add source host1 to rule 1 addelement fw_policies ##Standard rule:1:src:'' network_objects:host1 deleting a rule (untested) dbedit> rmbyindex fw_policies ##Standard rule 10 <br>dbedit> update_all fw_policies::##Standard Updated Successfully [[category:dbedit]] 280 83 2013-10-04T18:10:59Z Nighthawk 1 wikitext text/x-wiki add source host1 to rule 1 addelement fw_policies ##Standard rule:1:src:'' network_objects:host1 deleting a rule (untested) dbedit> rmbyindex fw_policies ##Standard rule 10 <br> dbedit> update_all fw_policies::##Standard Updated Successfully [[category:dbedit]] 83 2013-04-27T04:15:45Z Nighthawk 1 Created page with "add source host1 to rule 1 addelement fw_policies ##Standard rule:1:src:'' network_objects:host1 [[category:dbedit]]" wikitext text/x-wiki add source host1 to rule 1 addelement fw_policies ##Standard rule:1:src:'' network_objects:host1 [[category:dbedit]] dbedit scripts 0 59 78 77 2013-04-26T01:33:03Z Nighthawk 1 wikitext text/x-wiki == create hosts == for i in {1..12}; do \ echo "create network host_192.168.$i.0-24"; \ echo "modify network_objects host_192.168.$i.0-24 ipaddr 192.168.$i.0"; \ echo "update network_objects host_192.168.$i.0-24"; done == create networks == for i in {1..12}; do \ echo "create network net_192.168.$i.0-24"; \ echo "modify network_objects net_192.168.$i.0-24 ipaddr 192.168.$i.0"; \ echo "modify network_objects net_192.168.$i.0-24 netmask 255.255.255.0"; \ echo "update network_objects net_192.168.$i.0-24"; done [[category:dbedit]] 77 76 2013-04-26T01:32:20Z Nighthawk 1 wikitext text/x-wiki == create hosts == for i in {1..12}; do \ echo "create network host_192.168.$i.0-24"; \ echo "modify network_objects host_192.168.$i.0-24 ipaddr 192.168.$i.0"; \ echo "update network_objects host_192.168.$i.0-24"; done == create networks == for i in {1..12}; do \ echo "create network net_192.168.$i.0-24"; \ echo "modify network_objects net_192.168.$i.0-24 ipaddr 192.168.$i.0"; \ echo "modify network_objects net_192.168.$i.0-24 netmask 255.255.255.0"; \ echo "update network_objects net_192.168.$i.0-24"; done [[category:dbedit]] 76 2013-04-26T00:59:31Z Nighthawk 1 Created page with "for i in {1..12}; do echo "create network net_192.168.$i.0-24"; echo "modify network_objects net_192.168.$i.0-24 ipaddr 192.168.$i.0"; echo "modify network_objects net_192.168..." wikitext text/x-wiki for i in {1..12}; do echo "create network net_192.168.$i.0-24"; echo "modify network_objects net_192.168.$i.0-24 ipaddr 192.168.$i.0"; echo "modify network_objects net_192.168.$i.0-24 netmask 255.255.255.0"; echo "update network_objects net_192.168.$i.0-24"; done disabling smartmap 0 183 530 2014-08-11T17:33:50Z Nighthawk 1 Created page with " To disable SmartMap completely: # Backup and edit using vi the objects_5_0.C located at $FWDIR/conf on the active CMA / SmartCenter # Search for the line entry: totally_disa..." wikitext text/x-wiki To disable SmartMap completely: # Backup and edit using vi the objects_5_0.C located at $FWDIR/conf on the active CMA / SmartCenter # Search for the line entry: totally_disable_VPE # Change the value from false to true # Save and exit vi, restart the CMA / SmartCenter enable bash history in Gaia and SPLAT 0 173 888 609 2023-11-28T15:26:57Z Nighthawk 1 wikitext text/x-wiki by default, bash history is on but commands run are not save to the .bash_history file to be accessed upon you next login. [Expert@ckkpmgr]# s'''et -o | grep history''' history on [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 0 to enable it globally for all users [Expert@myfirewall]# '''sed -i -e 's/HISTFILESIZE=0/HISTFILESIZE=1000/' /etc/bashrc; source /etc/bashrc''' verify it worked [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 1000 bash command history is saved upon logout [[category:bash]] [[category:CLI]] 4097f00f269929e60b1bc5f1625d915ae09825d3 609 488 2016-11-22T14:33:36Z Nighthawk 1 wikitext text/x-wiki by default, bash history is on but commands run are not save to the .bash_history file to be accessed upon you next login. [Expert@ckkpmgr]# s'''et -o | grep history''' history on [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 0 to enable it globally for all users [Expert@myfirewall]# '''sed -i -e 's/HISTFILESIZE=0/HISTFILESIZE=1000/' /etc/bashrc; source /etc/bashrc''' verify it worked [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 10000 bash command history is saved upon logout [[category:bash]] [[category:CLI]] 4e035f7b5e4f4eda617543f82f5f9f7b0a018928 488 2014-05-28T07:57:30Z Nighthawk 1 Created page with "by default, bash history is on but commands run are not save to the .bash_history file to be accessed upon you next login. [Expert@ckkpmgr]# s'''et -o | grep history''' his..." wikitext text/x-wiki by default, bash history is on but commands run are not save to the .bash_history file to be accessed upon you next login. [Expert@ckkpmgr]# s'''et -o | grep history''' history on [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 0 to enable it globally for all users [Expert@myfirewall]# '''sed -i -e 's/HISTFILESIZE=0/HISTFILESIZE=10000/' /etc/bashrc; source /etc/bashrc''' verify it worked [Expert@ckkpmgr]# '''echo $HISTFILESIZE''' 10000 bash command history is saved upon logout [[category:bash]] [[category:CLI]] enable or disable a Provider-1 CMA 0 182 531 529 2014-09-05T18:10:09Z Nighthawk 1 moved [[enable / disable Provider-1 CMA]] to [[enable or disable a Provider-1 CMA]] wikitext text/x-wiki to disable a cma… 1) Connect to cma with write privledges, this creates a manage.lock file in $FWDIR/tmp/ 2) '''mdsenv <cma|cma_ip>''' 3) '''chattr +i $FWDIR/tmp/manage.lock''' this makes the file undeletable. Attempts to “disconnect” and forcibly take write access via smartdashboard fail, rm on the file fails too. to re-enable 1) '''mdsenv <cma|cma_ip>''' 2) '''chattr -i $FWDIR/tmp/manage.lock''' this makes the file deletable again 3) '''rm $FWDIR/tmp/manage.lock''' [[category:provider-1]] 529 528 2014-08-06T05:07:11Z Nighthawk 1 wikitext text/x-wiki to disable a cma… 1) Connect to cma with write privledges, this creates a manage.lock file in $FWDIR/tmp/ 2) '''mdsenv <cma|cma_ip>''' 3) '''chattr +i $FWDIR/tmp/manage.lock''' this makes the file undeletable. Attempts to “disconnect” and forcibly take write access via smartdashboard fail, rm on the file fails too. to re-enable 1) '''mdsenv <cma|cma_ip>''' 2) '''chattr -i $FWDIR/tmp/manage.lock''' this makes the file deletable again 3) '''rm $FWDIR/tmp/manage.lock''' [[category:provider-1]] 528 527 2014-08-06T05:06:35Z Nighthawk 1 wikitext text/x-wiki to disable a cma… 1) Connect to cma with write privledges, this creates a manage.lock file in $FWDIR/tmp/ 2) '''mdsenv <cma|cma_ip>''' 3) '''chattr +i $FWDIR/tmp/manage.lock''' this makes the file undeletable. Attempts to “disconnect” and forcibly take write access via smartdashboard fail, rm on the file fails too. to re-enable 1) '''mdsenv <cma|cma_ip>''' 2) '''chattr -i $FWDIR/tmp/manage.lock''', this makes the file deletable again 3) '''rm $FWDIR/tmp/manage.lock''' [[category:provider-1]] 527 2014-08-06T05:03:58Z Nighthawk 1 Created page with " to disable a cma… 1) Connect to cma with write privledges, this creates a manage.lock file in $FWDIR/tmp/ 2) mdsenv <cma|cma_ip> 3) chattr +i $FWDIR/tmp/manage.lock, th..." wikitext text/x-wiki to disable a cma… 1) Connect to cma with write privledges, this creates a manage.lock file in $FWDIR/tmp/ 2) mdsenv <cma|cma_ip> 3) chattr +i $FWDIR/tmp/manage.lock, this makes the file undeletable. Attempts to “disconnect” and forcibly take write access via smartdashboard fail, rm on the file fails too. to re-enable 1) mdsenv <cma|cma_ip> 2) chattr -i $FWDIR/tmp/manage.lock, this makes the file deletable again 3) rm $FWDIR/tmp/manage.lock [[category:provider-1]] enabling and disabling CMAs 0 202 610 2016-12-06T17:04:11Z Nighthawk 1 Created page with " == disable a CMA == # login to CMA with write privileges via SmartDashboard # mdsenv <cma|cma_ip> # chatter +i $FWDIR/tmp/manage.lock this make the manage.lock file undele..." wikitext text/x-wiki == disable a CMA == # login to CMA with write privileges via SmartDashboard # mdsenv <cma|cma_ip> # chatter +i $FWDIR/tmp/manage.lock this make the manage.lock file undeletable. Attempts to "disconnect" the user or even restarting the CMA will not have an effect. == re-enable == # mdsenv <cma|cma_ip> # chatter -i $FWDIR/tmp/manage.lock # rm $FWDIR/tmp/manage.lock [[category:provider-1]] 023ce041b67b4db5b0e35ff85099ab975f4e68a5 firewall log accept and drop rate calculation 0 49 506 505 2014-06-23T18:55:16Z Nighthawk 1 wikitext text/x-wiki '''baseline /count accepts & drops for the last minute from firewall 192.168.1.1''' accept commmand # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 drop command # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 == script (one liner) == This command will give you the accept and drop rate for the last minute for the IP specified. [Expert@cplogger]# '''IP="192.168.1.1"; for i in accept drop; do printf "$i "; fw log -n -c $i -h $IP -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l; done''' accept 699 drop 301 [[category:logs]] 505 504 2014-06-23T17:46:55Z Nighthawk 1 moved [[firewall log accept / drop rate calculation]] to [[firewall log accept and drop rate calculation]] wikitext text/x-wiki '''baseline /count accepts & drops for the last minute from firewall 192.168.1.1''' accept commmand # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 drop command # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 == script (one liner) == This command will give you the accept and drop rate for the last minute for the IP specified. [Expert@cplogger]# '''IP="192.168.1.1"; for i in accept drop; do printf "$i "; fw log -n -c $i -h $IP -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l; done''' accept 699 drop 301 [[category:logs]] 504 503 2014-06-23T17:13:28Z Nighthawk 1 wikitext text/x-wiki '''baseline /count accepts & drops for the last minute from firewall 192.168.1.1''' accept commmand # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 drop command # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 == script (one liner) == This command will give you the accept and drop rate for the last minute for the IP specified. [Expert@cplogger]# '''IP="192.168.1.1"; for i in accept drop; do printf "$i "; fw log -n -c $i -h $IP -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l; done''' accept 699 drop 301 [[category:logs]] 503 65 2014-06-23T17:13:17Z Nighthawk 1 wikitext text/x-wiki '''baseline /count accepts & drops for the last minute from firewall 192.168.1.1''' accept commmand # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 drop command # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 == script (one liner) == This command will give you the accept and drop rate for the last minute for the IP specified. [Expert@cplogger]# IP="192.168.1.1"; for i in accept drop; do printf "$i "; fw log -n -c $i -h $IP -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l; done accept 699 drop 301 [[category:logs]] 65 54 2013-04-20T23:55:34Z Nighthawk 1 wikitext text/x-wiki '''baseline /count accepts & drops for the last minute from firewall 192.168.1.1''' # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 [[category:logs]] 54 2013-04-12T16:09:48Z Nighthawk 1 Created page with "'''count accepts / drops for the last minute from firewall 192.168.1.1''' # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |w..." wikitext text/x-wiki '''count accepts / drops for the last minute from firewall 192.168.1.1''' # fw log -n -c accept -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 9013 # fw log -n -c drop -h 192.168.1.1 -s `/bin/date --date="1 minutes ago" +%T` -e `/bin/date +%T` |wc -l 761 [[category:logs]] firewall log parsing scratch notes 0 184 544 2014-10-08T14:12:13Z Nighthawk 1 Created page with " command run on "fw log" output to txt file... cat /var/tmp/CLM_2014-10-03_06-00-00_to_09-00-00.log.txt | awk -F ";" '{print $3}' | awk "{print $2}' | uniq -c | sort -rn |..." wikitext text/x-wiki command run on "fw log" output to txt file... cat /var/tmp/CLM_2014-10-03_06-00-00_to_09-00-00.log.txt | awk -F ";" '{print $3}' | awk "{print $2}' | uniq -c | sort -rn | head cat /var/tmp/CLM_2014-10-03_06-00-00_to_09-00-00.log.txt | awk '{for (i=1; i<=NF; i++) if ($i=="src:") print $(i+1)}' | uniq -c | sort -rn | head cat /var/tmp/CLM_2014-10-03_06-00-00_to_09-00-00.log.txt | awk '{for (i=1; i<=NF; i++) if ($i=="src:") print $(i+1)}' | sort | uniq -c | sort -n -r | head cat /var/tmp/CLM_2014-10-03_06-00-00_to_09-00-00.log.txt | grep "src: 17.24.13.25" | awk '{for (i=1; i<=NF; i++) if ($i=="src:") print $(i+1)} ' | wc -l awk '{for (i=1; i<=NF; i++) if ($i=="src:") print $(i+1)}' | sort | uniq -c | sort -n -r | head firewall logconnection status 0 214 667 2017-06-16T00:13:47Z Nighthawk 1 Created page with "[Expert@chkpfw1:0]# cpstat fw -f log_connection" wikitext text/x-wiki [Expert@chkpfw1:0]# cpstat fw -f log_connection 55ad0d2da39e528f9a3fa20d5c4aa788fdb74e4a fortimanager VM notes 0 268 916 2024-06-20T18:05:10Z Nighthawk 1 Created page with "==version 6.4== this version was used because higher versions were failing on the trial license for me. ==console login== default login = admin / (empty password) ==initial c..." wikitext text/x-wiki ==version 6.4== this version was used because higher versions were failing on the trial license for me. ==console login== default login = admin / (empty password) ==initial config== config system interface edit port1 set mode static set ip 10.1.1.100 255.255.255.0 next end config system route edit 1 set device port1 set gateway 10.1.1.1 next end ==license== connect a browser via https to the IP above. You get a message about signing into forticloud for the trial license. Login and proceed and hope for a message of success. I forgot to screenshot it. view VM license via CLI. FMG-VM64-KVM # '''diag debug vminfo''' VM license is valid. Type: Trial Max devices: 3 Management IP: 0.0.0.0 VM UUID: 2da3fe28-143d-415f-9939-2d8f8c6ce433 no expiration date... yay! too bad it is so old. [[category:fortinet]] 66b5a16b5e3e8175f63a655d9fba4290e49360f7 fortinet CLI notes 0 261 917 915 2024-06-20T18:10:14Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== ===configure=== example # config system interface # edit port1 # set mode static # set ip 10.1.1.1 255.255.255.0 # next # end ===get info== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 or just leave the line out. HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show uptime # config global # get system perf status | grep -i uptime shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # '''diagnose sniffer packet port1 'icmp'''' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply ==misc== check if fortigate has fortimanager central-management setting $ show full-configuration | grep "set fmg " ==default login== VM images = admin / (empty password) [[category:fortinet]] 4b0277fde44937072dc49bb27ad88f8283499a8b 915 908 2024-06-20T17:59:13Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show uptime # config global # get system perf status | grep -i uptime shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # '''diagnose sniffer packet port1 'icmp'''' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply ==misc== check if fortigate has fortimanager central-management setting $ show full-configuration | grep "set fmg " ==virtual machine== default login = admin / (empty password) [[category:fortinet]] d209fd9ff7b2b291c890abcf0d936d16a4986d16 908 907 2024-05-07T19:47:12Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show uptime # config global # get system perf status | grep -i uptime shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # '''diagnose sniffer packet port1 'icmp'''' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply ==misc== check if fortigate has fortimanager central-management setting $ show full-configuration | grep "set fmg " [[category:fortinet]] debe0873c896076d1ba3cea651dadbfc95aea9c8 907 875 2024-05-02T23:14:15Z Nighthawk 1 /* packet capture */ wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show uptime # config global # get system perf status | grep -i uptime shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # '''diagnose sniffer packet port1 'icmp'''' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply [[category:fortinet]] 17d7202daca697c442bef2ce79cd1b05de860745 875 873 2022-11-06T02:51:35Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show uptime # config global # get system perf status | grep -i uptime shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # diagnose sniffer packet port1 'icmp' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply [[category:fortinet]] 83799844baa5ea01d07c0c0b305626bbbbf5dba2 873 872 2022-08-25T20:43:51Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy ==packet capture== # diagnose sniffer packet <interface|any> '<tcpdump-filter>' <verbosity> <count> <time-format> where if count = 0, then unlimited example: fotinet1 # diagnose sniffer packet port1 'icmp' 4 2 l interfaces=[port1] filters=[icmp] 2022-08-25 13:16:52.397609 port1 -- 192.168.169.76 -> 192.168.169.31: icmp: echo request 2022-08-25 13:16:52.397673 port1 -- 192.168.169.31 -> 192.168.169.76: icmp: echo reply [[category:fortinet]] 9f53400dbb28895c0e2e3a6aee17af2b58688e5d 872 871 2022-08-25T20:24:50Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show shutdown/reboot # execute shutdown or # execute reboot ==firewall== # show firewall policy [[category:fortinet]] b7b3e053cd94c54942c56b60b53eca36a9b2daab 871 870 2022-08-24T22:24:20Z Nighthawk 1 /* routes */ wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show shutdown/reboot # execute shutdown or # execute reboot [[category:fortinet]] b591788cc3ec11fd832844b4830314ca37ff78b2 870 869 2022-08-24T22:23:42Z Nighthawk 1 /* routes */ wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== # config router static # edit <route_index> # set device "<interface_name>" # set dst "<destination_ip>" # set gateway "<router_ip>" for default gw.. # set dst 0.0.0.0 0.0.0.0 HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show [[category:fortinet]] 033c55bb057c24d73a28f93ca7b5d833318c2ab3 869 868 2022-08-24T22:22:38Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> ==routes== config router static edit <route_index> set device "<interface_name>" set dst "<destination_ip>" set gateway "<router_ip>" HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show [[category:fortinet]] a6aabf04ce1844a31c0660c002ba4e767719b1ba 868 867 2022-08-21T08:14:10Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> HA status # config global # get sys ha status HA failover to highest priority (if it is not currently Master) on current master run... # config global # diagnose sys ha reset-uptime get admin hash password # config global # config sys admin # show [[category:fortinet]] e3f182851ba845f50390cef7365a6aab4ec6f390 867 866 2022-08-15T00:54:40Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> HA status # config global # get sys ha status get admin hash password # config global # config sys admin # show [[category:fortinet]] 5bad8d6c3e3de749014986d01b7716001640f1b6 866 865 2022-05-07T18:13:01Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # ==interface commands== for admin status, link stat, speeds, counters... # config global # get hardware nic <interface name> [[category:fortinet]] 7312f337c1402d2a7e4645ebfc2beda944668c4f 865 864 2021-12-02T16:30:08Z Nighthawk 1 wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # [[category:fortinet]] ff30b60a42f456dd5a6b91bc313072f6a6e0325f 864 2021-12-02T16:29:53Z Nighthawk 1 Created page with " ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # [[category:fortinet]]" wikitext text/x-wiki ==vdom== entering editing a vdom # config vdom (vdom) # edit myvdom (myvdom) # [[category:fortinet]] 1b37df8e919fd23497353224e3acff45562d6b3c fortinet downloads 0 269 918 2024-06-20T21:18:53Z Nighthawk 1 Created page with "https://support.fortinet.com/Download/FirmwareImages.aspx" wikitext text/x-wiki https://support.fortinet.com/Download/FirmwareImages.aspx 4a27edf9a560a8106d818448a4dc3801b7d53477 fw audit log parsing via CLI 0 113 206 205 2013-08-21T14:14:48Z Nighthawk 1 wikitext text/x-wiki Log entries and field changes are separated by semicolons in the fw.adtlog file. It is very difficult to read, even with the smartview tracker. The command line below run on the SmartCenter or from a CMA environment will output the log file in an easy to read format to terminal. parse # fw log -ln -s "Aug 19,2013 21:45:00" -e "Aug 20,2013 23:59:00" fw.adtlog | awk -F ";" '{for (i=1; i<=NF; i++) printf $i "\n"}' example output... 19Aug2013 21:53:01 accept 192.168.1.1 < ObjectName: test_group_object ObjectType: network_object_group ObjectTable: network_objects Operation: Modify Object Uid: {F7F0772C-0917-11E3-8A4F-ABB20701CFCF} Administrator: jsmith Machine: lab-mds FieldsChanges: test_group_object: added 'test_client' [[category:logging]] 205 2013-08-21T14:14:14Z Nighthawk 1 Created page with "Log entries and field changes are separated by semicolons in the fw.adtlog file. It is very difficult to read, even with the smartview tracker. The command line below run o..." wikitext text/x-wiki Log entries and field changes are separated by semicolons in the fw.adtlog file. It is very difficult to read, even with the smartview tracker. The command line below run on the SmartCenter or from a CMA environment will output the log file in an easy to read format to terminal. parse fw log -ln -s "Aug 19,2013 21:45:00" -e "Aug 20,2013 23:59:00" fw.adtlog | awk -F ";" '{for (i=1; i<=NF; i++) printf $i "\n"}' 19Aug2013 21:53:01 accept 192.168.1.1 < ObjectName: test_group_object ObjectType: network_object_group ObjectTable: network_objects Operation: Modify Object Uid: {F7F0772C-0917-11E3-8A4F-ABB20701CFCF} Administrator: jsmith Machine: lab-mds FieldsChanges: test_group_object: added 'test_client' [[category:logging]] fw log command line example 0 17 550 154 2015-01-20T20:23:48Z Nighthawk 1 wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 192.168.1.1 -s "Sep 1, 2011 15:00:00" -e "Sep 1, 2011 19:00:00" fw.log [[category:check point]] 154 153 2013-06-21T15:44:23Z Nighthawk 1 moved [[Check point firewall command reference]] to [[fw log command line example]] wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 192.168.1.1 -s "Sep 1, 2011" 15:00:00 -e "Sep 1, 2011" 19:00:00 fw.log [[category:check point]] 153 152 2013-06-21T15:44:07Z Nighthawk 1 Undo revision 152 by [[Special:Contributions/Nighthawk|Nighthawk]] ([[User talk:Nighthawk|talk]]) wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 192.168.1.1 -s "Sep 1, 2011" 15:00:00 -e "Sep 1, 2011" 19:00:00 fw.log [[category:check point]] 152 151 2013-06-21T15:43:18Z Nighthawk 1 Undo revision 151 by [[Special:Contributions/Nighthawk|Nighthawk]] ([[User talk:Nighthawk|talk]]) wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 171.160.122.50 -s "Sep 1, 2011" 15:00:00 -e "Sep 1, 2011" 19:00:00 2011-09-01_190552_291.log>/var/tmp/kdmzric2_logs_1500gmt_to_1900gmt_sep1.txt [[category:check point]] 151 21 2013-06-21T15:14:50Z Nighthawk 1 wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 192.168.1.1 -s "Sep 1, 2011" 15:00:00 -e "Sep 1, 2011" 19:00:00 fw.log [[category:check point]] 21 2013-02-25T22:55:48Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki ==fw log command line examples == fw log -ln -h 171.160.122.50 -s "Sep 1, 2011" 15:00:00 -e "Sep 1, 2011" 19:00:00 2011-09-01_190552_291.log>/var/tmp/kdmzric2_logs_1500gmt_to_1900gmt_sep1.txt [[category:check point]] fw tab - Check Point man page 0 132 348 347 2014-02-28T18:16:40Z Nighthawk 1 /* Comments */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<nowiki> <table-name> </nowiki> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1" or # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 347 346 2014-02-28T18:16:32Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<nowiki> <table-name> </nowiki> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1" or # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 346 345 2014-02-28T18:16:05Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<nowiki> <table-name> </nowiki> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1" or # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 345 344 2014-02-28T18:15:08Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or # fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1" or # fw tab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 344 343 2014-02-28T18:14:38Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<nowiki> <table-name></nowiki> -x-e"0,1" or fwtab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 343 342 2014-02-28T18:14:19Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == # fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<nowiki> <table-name></nowiki> fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2," or fw tab -t <nowiki> <table-name> </nowiki> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<nowiki> <table-name></nowiki> -x-e"0,1" or fwtab-t<nowiki> <table-name></nowiki> -x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 342 341 2014-02-28T18:12:32Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <nowiki> <table-name> </nowiki> -a -e "1,2;3,4,5" or or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 341 340 2014-02-28T18:11:55Z Nighthawk 1 /* Syntax */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <table-name> -a -e "1,2;3,4,5" or or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 340 339 2014-02-28T18:11:48Z Nighthawk 1 /* Syntax */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <table-name> -a -e "1,2;3,4,5" or or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 339 338 2014-02-28T18:11:28Z Nighthawk 1 /* Example */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <table-name> -a -e "1,2;3,4,5" or or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 338 337 2014-02-28T18:10:25Z Nighthawk 1 /* Description */ wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <table-name> -a -e "1,2;3,4,5" or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 337 336 2014-02-28T18:10:14Z Nighthawk 1 wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t <nowiki> <table> </nowiki> | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} == Example == fw tab -t <table-name> -a -e "1,2;3,4,5" or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: <0000000,00000001,00000002> fwtab-t<table-name>-x-e"0,1" or fwtab-t<table-name>-x-e"0,1;2" Removes the entry from the specified table. == Comments == If table has the 'expire' attribute, entries added using the -a flag will receive the default table timeout. This feature only works on local machine kernel tables and does not work on a remote machine's tables like additional fw tab commands. The -x flag can be used independently of the -e flag in which case the entire table content is deleted. This feature should only be used for debug purposes. It is not advisable to arbitrarily change the content of any kernel table since doing so may have unexpected results including unexpected security and connectivity impacts. [[category:man pages]] [[category:version R75]] [[category:check point]] 336 2014-02-28T18:07:00Z Nighthawk 1 Created page with "== fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table ..." wikitext text/x-wiki == fw tab == == Description == The fw tab command enables you to view kernel table contents and change them (that is, only dynamic tables since the content of a static table is indeed static). == Usage == fw tab [-t <table>] [-s] -c] [-f] [-o <filename>] [-r] [-u | -m <maxvals>] [[-x | -a} -e entry] [-y] [hostname]" == Syntax == {| cellspacing="5" border="1" ! align="left"|Argument !Description |- | -t table | Specifies a table for the command. |- | -s | Displays a short summary of the table (s) information. |- | -y | Specifies to not prompt a user before executing any commands. |- | -f | Displays a formatted version of the table content. Every table may have its own specific format style. |- | -o <filename> | Dumps CL formatted output to filename, which can later be read by fw log or any other entity that can read FW log formats. |- | -c | Displays formatted table information in common format. |- | -r | Resolves IP addresses in formatted output. |- | -x, -a, -e | It is possible to add or remove an entry from an existing dynamic table by using the -a or the -x flags, respectively. These flags must be followed by the -e flag and an entry description (<entry>). Caution - Improper use of the -a and -x flags may cause system instability. |- | [hostname] | A list of one or more targets. When not used, the local machine is used as the default target. |} Example fw tab -t <table-name> -a -e "1,2;3,4,5" or fw tab -t <table-name> -a -e "<1,2;3,4,5>" Adds an entry: <00000001,00000002,00000003,00000004,00000005,>to<table-name> fw tab -t <table-name> -a -e "1,2," or fw tab -t <table-name> -a -e "<1,2>" Adds an entry with only a key field: <00000001,00000002> If table<table-name> contains the following<0000000,00000001,00000002> entry: [[category:man pages]] [[category:version R75]] [[category:check point]] fwd log buffer parameters 0 192 583 2016-06-03T13:49:24Z Nighthawk 1 Created page with "[admin@chkpfw1 ~]# grep FW_ASYC_BUFFER_FOR_FWD /opt/CPshrd-R77/registry/HKLM_registry.data :FW_ASYC_BUFFER_FOR_FWD ("[4]3000") [admin@c..." wikitext text/x-wiki [admin@chkpfw1 ~]# grep FW_ASYC_BUFFER_FOR_FWD /opt/CPshrd-R77/registry/HKLM_registry.data :FW_ASYC_BUFFER_FOR_FWD ("[4]3000") [admin@chkpfw1 ~]# grep BUFFER_RECS_FOR_FWD /opt/CPshrd-R77/registry/HKLM_registry.data :BUFFER_RECS_FOR_FWD ("[4]40000") [[category:logging]] 21670cb359be02143b0ea1f0927aa54c21934bac gaia - adding an alias interface 0 209 636 635 2017-04-30T02:44:23Z Nighthawk 1 wikitext text/x-wiki at the clish prompt mygw> add interface eth0 alias 192.168.1.10/24 the alias created will look like... eth0:1 Link encap:Ethernet HWaddr 82:3E:FC:AF:B5:80 inet addr:192.168.1.10 Bcast:192.168.1.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 Interrupt:185 Base address:0xa000 a5d46a251e57712be586d0586fdcbb93a0ceb2f5 635 2017-04-30T02:41:03Z Nighthawk 1 Created page with " at the clish prompt mygw> add interface eth0 alias 192.168.1.10/24" wikitext text/x-wiki at the clish prompt mygw> add interface eth0 alias 192.168.1.10/24 e7ce56325de9240f0bd93ccb3c3d9d848eac8ca8 gaia 77.30 bug 0 188 570 569 2016-01-18T16:29:02Z Nighthawk 1 wikitext text/x-wiki [Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" <br>CLINFR0710 Illegal characters <br>[Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" <br>CLINFR0710 Illegal characters <br>[Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" <br>CLINFR0710 Illegal characters <br>[Expert@chkpfw1:0]# cat /etc/cp-release <br>Check Point Gaia R77.30 <br>[Expert@chkpfw1:0]# clish <br>chkpfw1> set user admin newpass abc1235 <br>CLINFR0710 Illegal characters <br>chkpfw1> exit <br>[Expert@chkpfw1:0]# clish <br>chkpfw1> set user admin newpass abc1235 <br>CLINFR0710 Illegal characters <br>chkpfw1> set user admin newpass abc1235 <br>chkpfw1> save config 569 2016-01-18T16:28:13Z Nighthawk 1 Created page with "[Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" CLINFR0710 Illegal characters [Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" CLINFR0710 Ille..." wikitext text/x-wiki [Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" CLINFR0710 Illegal characters [Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" CLINFR0710 Illegal characters [Expert@chkpfw1:0]# clish -c "set user admin newpass abc1235" CLINFR0710 Illegal characters [Expert@chkpfw1:0]# cat /etc/cp-release Check Point Gaia R77.30 [Expert@chkpfw1:0]# clish chkpfw1> set user admin newpass abc1235 CLINFR0710 Illegal characters chkpfw1> exit [Expert@chkpfw1:0]# clish chkpfw1> set user admin newpass abc1235 CLINFR0710 Illegal characters chkpfw1> set user admin newpass abc1235 chkpfw1> save config gaia CLI upgrades 0 210 640 639 2017-04-30T20:02:25Z Nighthawk 1 /* R75.40 to R77.10 */ wikitext text/x-wiki ==R75.40 to R77.10== <br>To upgrade using an ISO image on a DVD: <br>Note - This procedure is not supported on IP Appliances. <br>1. Download the Gaia ISO image from the Check Point Support Center <br>http://supportcontent.checkpoint.com/solutions?id=sk92965. <br>Check_Point_Install_and_Upgrade_R77.Gaia.iso <br>2. Mount the iso image to the device to be upgraded. This can be done via physical drive, or virtually attaching the iso. <br>3. From clish, run: upgrade cd ==troubleshooting== === error: mount failed === chkpmgr> upgrade cd UPGRADE: mount failed: Device or resource busy in this scenario, i had manually mounted the /dev/cdrom to /mnt/cdrom. this is not needed and even causes the upgrade command to fail. I solve it by unmounting the cdrom. # umount /dev/cdrom bc04f64bfbc873690e5e1467da7486089c53ab1a 639 638 2017-04-30T19:57:42Z Nighthawk 1 /* R75.40 to R77.10 */ wikitext text/x-wiki ==R75.40 to R77.10== <br>To upgrade using an ISO image on a DVD: <br>Note - This procedure is not supported on IP Appliances. <br>1. Download the Gaia ISO image from the Check Point Support Center <br>http://supportcontent.checkpoint.com/solutions?id=sk92965. <br>Check_Point_Install_and_Upgrade_R77.Gaia.iso <br>2. Burn the ISO file on a DVD. <br>3. Connect an external DVD drive to a USB socket on the appliance or open server. <br>4. From clish, run: upgrade cd ==troubleshooting== === error: mount failed === chkpmgr> upgrade cd UPGRADE: mount failed: Device or resource busy in this scenario, i had manually mounted the /dev/cdrom to /mnt/cdrom. this is not needed and even causes the upgrade command to fail. I solve it by unmounting the cdrom. # umount /dev/cdrom 54eb918d5ad0a5985ad16f620515ee36f9e574ca 638 2017-04-30T19:56:33Z Nighthawk 1 Created page with " ==R75.40 to R77.10== To upgrade using an ISO image on a DVD: Note - This procedure is not supported on IP Appliances. 1. Download the Gaia ISO image from the Check Point Su..." wikitext text/x-wiki ==R75.40 to R77.10== To upgrade using an ISO image on a DVD: Note - This procedure is not supported on IP Appliances. 1. Download the Gaia ISO image from the Check Point Support Center http://supportcontent.checkpoint.com/solutions?id=sk92965. Check_Point_Install_and_Upgrade_R77.Gaia.iso 2. Burn the ISO file on a DVD. 3. Connect an external DVD drive to a USB socket on the appliance or open server. 4. From clish, run: upgrade cd ==troubleshooting== === error: mount failed === chkpmgr> upgrade cd UPGRADE: mount failed: Device or resource busy in this scenario, i had manually mounted the /dev/cdrom to /mnt/cdrom. this is not needed and even causes the upgrade command to fail. I solve it by unmounting the cdrom. # umount /dev/cdrom 56d556f0781c4d050bc2692e63ddbe96f19090a3 gaia list interface parameters on a single line 0 194 586 2016-06-10T03:38:50Z Nighthawk 1 Created page with "clish -c "show interfaces" | grep -v -E "lo|Mgmt|Sync" | while read line; do printf "$line,"; for i in state link-state speed duplex ipv4-address auto-negotiation mtu monitor-..." wikitext text/x-wiki clish -c "show interfaces" | grep -v -E "lo|Mgmt|Sync" | while read line; do printf "$line,"; for i in state link-state speed duplex ipv4-address auto-negotiation mtu monitor-mode; do PARAM=`clish -c "show interface $line $i"`; printf "$PARAM,"; done; echo; done 8bd62743cb73e620cf47536eae2556bc180555f3 gaia log rotation settings 0 245 789 2018-05-23T15:36:51Z Nighthawk 1 Created page with "found in... /etc/cpshell/log_rotation.conf" wikitext text/x-wiki found in... /etc/cpshell/log_rotation.conf 233cfeb975967b5b9e246db52d04683b0e8ffab0 gaia setup via CLI 0 191 578 577 2016-04-13T17:03:47Z Nighthawk 1 /* creating a config template */ wikitext text/x-wiki we don't like wizards... == creating a config template == # config_system --create-template <template_name> edit the template and fill out fields per comments test the validity of the template # config_system --config-file <template_name> --dry-run once validated, run it on a newly installed system without the dry run option # config_system --config-file <template_name> == backing up configs == This is not snapshotting an filesystems, only the configuration. # clish -c "show configuration" > backupfile 577 2016-04-13T17:03:31Z Nighthawk 1 Created page with "we don't like wizards... == creating a config template == # config_system --create-template <template_name> edit the template and fill out fields per comments test the v..." wikitext text/x-wiki we don't like wizards... == creating a config template == # config_system --create-template <template_name> edit the template and fill out fields per comments test the validity of the template # config_system --config-file <template_name> --dry-run once validated, run it on a newly installed system without the dry run option # config_system --config-file <template_name> == backing up configs == This is not snapshotting an filesystems, only the configuration. # clish -c "show configuration" > backupfile gaia vrrp setup using CLI 0 123 262 2013-09-15T08:44:40Z Nighthawk 1 moved [[gaia vrrp setup using CLI]] to [[Gaia VRRP setup guide]] wikitext text/x-wiki #REDIRECT [[Gaia VRRP setup guide]] geoprotection 0 155 430 2014-05-02T05:56:35Z Nighthawk 1 Created page with "iptocountry data file location $FWDIR/tmp/geo_location_tmp/updates/IpToCountry.csv == file format == # FILE FORMAT IPV4 # ================ # # ---------------------..." wikitext text/x-wiki iptocountry data file location $FWDIR/tmp/geo_location_tmp/updates/IpToCountry.csv == file format == # FILE FORMAT IPV4 # ================ # # -------------------------------------------------------------- # All lines beginning with either "#" or whitespace are comments # -------------------------------------------------------------- # # IP FROM IP TO REGISTRY ASSIGNED CTRY CNTRY COUNTRY # "1346797568","1346801663","ripencc","20010601","il","isr","Israel" # # IP FROM & : Numerical representation of IP address. # IP TO Example: (from Right to Left) # 1.2.3.4 = 4 + (3 * 256) + (2 * 256 * 256) + (1 * 256 * 256 * 256) # is 4 + 768 + 13,1072 + 16,777,216 = 16,909,060 # # REGISTRY : apcnic, arin, lacnic, ripencc and afrinic # Also included as of April 22, 2005 are the IANA IETF Reserved # address numbers. These are important since any source claiming # to be from one of these IPs must be spoofed. # # ASSIGNED : The date this IP or block was assigned. (In Epoch seconds) # NOTE: Where the allocation or assignment has been transferred from # one registry to another, the date represents the date of first # assignment or allocation as received in from the original RIR. # It is noted that where records do not show a date of first # assignment, the date is given as "0". # # CTRY : 2 character international country code # NOTE: ISO 3166 2-letter code of the organisation to which the # allocation or assignment was made, and the enumerated variances of: # AP - non-specific Asia-Pacific location # CS - Serbia and Montenegro # YU - Serbia and Montenegro (Formally Yugoslavia) (Being phased out) # EU - non-specific European Union location # FX - France, Metropolitan # PS - Palestinian Territory, Occupied # UK - United Kingdom (standard says GB) # * ZZ - IETF RESERVED address space. take from [http://netwinsite.com/surgemail/IpToCountry.csv http://netwinsite.com/surgemail/IpToCountry.csv] get cmm status 0 146 409 408 2014-04-07T02:56:23Z Nighthawk 1 wikitext text/x-wiki example (normal status) [Expert@my61k]# '''asg_chassis_ctrl get_cmm_status''' Getting CMM(s) status CMM #1 -> Health: 1, Active: 1 CMM #2 -> Health: 1, Active: 0 Active CMM firmware version: 2.70 example (problem status) [Expert@my61k]# '''asg_chassis_ctrl get_cmm_status''' Getting CMM(s) status CMM #1 -> Health: 0, Active: 1 CMM #2 -> Health: 0, Active: 0 Active CMM firmware version: 2.83 [[category:61000]] 408 2014-04-06T05:23:59Z Nighthawk 1 Created page with " # asg_chassis_ctrl get_cmm_status Getting CMM(s) status CMM #1 -> Health: 0, Active: 1 CMM #2 -> Health: 0, Active: 0 Active CMM firmware version: 2.83 [Expert@PDM..." wikitext text/x-wiki # asg_chassis_ctrl get_cmm_status Getting CMM(s) status CMM #1 -> Health: 0, Active: 1 CMM #2 -> Health: 0, Active: 0 Active CMM firmware version: 2.83 [Expert@PDMZRIC_UPPER-ch02-01]# asg_chassis_ctrl get_cmm_status Getting CMM(s) status CMM #1 -> Health: 1, Active: 1 CMM #2 -> Health: 1, Active: 0 Active CMM firmware version: 2.70 [[category:61000]] get or set active / backup status from CMM CLI 0 148 417 416 2014-04-15T15:34:03Z Nighthawk 1 wikitext text/x-wiki To get CMM (shmm) status after logging into the CMM, use the commands below. shmm500 login: admin Password: == get status == # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter <br>Host: "Active" # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter Running on the Backup Shelf Manager, with limited functionality <br>Host: "Backup" == set status == The swithover command will change the active CMM/shmm. All it seems to do is reboot the Active CMM. If run from the Backup CMM (in the example below), it will reboot the other CMM. If run on the active, it will immediately reboot on you. example when run from the Backup CMM/shmm # clia switchover <br>Pigeon Point Shelf Manager Command Line Interpreter Running on the Backup Shelf Manager, with limited functionality <br>Sending switchover request to the Active Host [[category:cmm]] [[category:61000]] 416 415 2014-04-15T15:30:00Z Nighthawk 1 moved [[get active / backup status from CMM CLI]] to [[get or set active / backup status from CMM CLI]] wikitext text/x-wiki To get CMM (shmm) status after logging into the CMM, use the commands below. shmm500 login: admin Password: # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter <br>Host: "Active" # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter Running on the Backup Shelf Manager, with limited functionality <br>Host: "Backup" [[category:cmm]] [[category:61000]] 415 2014-04-15T15:24:23Z Nighthawk 1 Created page with "To get CMM (shmm) status after logging into the CMM, use the commands below. shmm500 login: admin Password: # clia shmstatus <br>Pigeon Point Shelf Manager Command Line ..." wikitext text/x-wiki To get CMM (shmm) status after logging into the CMM, use the commands below. shmm500 login: admin Password: # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter <br>Host: "Active" # clia shmstatus <br>Pigeon Point Shelf Manager Command Line Interpreter Running on the Backup Shelf Manager, with limited functionality <br>Host: "Backup" [[category:cmm]] [[category:61000]] growing root partition 0 187 568 567 2015-12-04T07:10:36Z Nighthawk 1 /* Solution */ wikitext text/x-wiki == Problem == insufficient disk space in /opt to apply an upgrade. O.S. : secure platform (splat) or gaia Check Point versions: multiple == Solution == Use available, unallocated disk space. Newer Check Point version use LVM. Check Point often doesn't allocate it all. This not a bad thing. It is a common, best practice with LVM. This allows admins to easily grow partitions as needed using the free disk space. If you allocated it all up front, but needed one partition bigger, you would have to shrink one to grow another. This is more complicated. With root, it can't be shrunk while the system is running(it can be grown as we are about to see). '''Example''' [Expert@chkpfw1:0]# '''df -h''' Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 4.9G 3.6G 1.1G 77% / <<< root does't have enough space for my 77.30 upgrade :( /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 3.7G 2.9G 57% /var/log Check the volumn groups for Free space [Expert@chkpfw2:0]# '''vgdisplay | grep -i size''' VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 384 / 12.00 GB Free PE / Size 214 / 6.69 GB <<< yay! I have some! adding/growing the logical volume "container" [Expert@chkpfw2:0]# '''lvresize -L +6.69GB vg_splat/lv_current''' Rounding up size to full physical extent 6.72 GB Extending logical volume lv_current to 11.72 GB Insufficient free space: 215 extents needed, but only 214 available that failed... specifying the increase in GB is less precise. So, lets use "extents" [Expert@chkpfw2:0]# '''lvresize -l +214 vg_splat/lv_current''' Extending logical volume lv_current to 11.69 GB Logical volume lv_current successfully resized verifying new volume group size [Expert@chkpfw2:0]# vgdisplay | grep -i -E "name|size" VG Name vg_splat VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 598 / 18.69 GB Free PE / Size 0 / 0 growing the file system to fill the "container" [Expert@chkpfw2:0]# '''resize2fs /dev/mapper/vg_splat-lv_current''' resize2fs 1.39 (29-May-2006) Filesystem at /dev/mapper/vg_splat-lv_current is mounted on /; on-line resizing required Performing an on-line resize of /dev/mapper/vg_splat-lv_current to 3063808 (4k) blocks. The filesystem on /dev/mapper/vg_splat-lv_current is now 3063808 blocks long. viewing newly allocated disk space [Expert@chkpfw2:0]# df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 12G 3.6G 7.2G 33% / /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 2.2G 4.3G 34% /var/log So, we grew root while the system had it mounted and was running from it. Thank you LVM! 567 566 2015-12-04T07:10:18Z Nighthawk 1 wikitext text/x-wiki == Problem == insufficient disk space in /opt to apply an upgrade. O.S. : secure platform (splat) or gaia Check Point versions: multiple == Solution == Use available, unallocated disk space. Newer Check Point version use LVM. Check Point often doesn't allocate it all. This not a bad thing. It is a common, best practice with LVM. This allows admins to easily grow partitions as needed using the free disk space. If you allocated it all up front, but needed one partition bigger, you would have to shrink one to grow another. This is more complicated. With root, it can't be shrunk while the system is running(it can be grown as we are about to see). '''Example''' [Expert@chkpfw1:0]# '''df -h''' Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 4.9G 3.6G 1.1G 77% / <<< root does't have enough space for my 77.30 upgrade :( /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 3.7G 2.9G 57% /var/log Check the volumn groups for Free space [Expert@chkpfw2:0]# '''vgdisplay | grep -i size''' VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 384 / 12.00 GB Free PE / Size 214 / 6.69 GB <<< yay! I have some! adding/growing the logical volume "container" [Expert@chkpfw2:0]# '''lvresize -L +6.69GB vg_splat/lv_current''' Rounding up size to full physical extent 6.72 GB Extending logical volume lv_current to 11.72 GB Insufficient free space: 215 extents needed, but only 214 available that failed... specifying the increase in GB is less precise. So, lets use "extents" [Expert@chkpfw2:0]# '''lvresize -l +214 vg_splat/lv_current''' Extending logical volume lv_current to 11.69 GB Logical volume lv_current successfully resized verifying new volume group size [Expert@chkpfw2:0]# vgdisplay | grep -i -E "name|size" VG Name vg_splat VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 598 / 18.69 GB Free PE / Size 0 / 0 growing the file system to fill the "container" [Expert@chkpfw2:0]# '''resize2fs /dev/mapper/vg_splat-lv_current''' resize2fs 1.39 (29-May-2006) Filesystem at /dev/mapper/vg_splat-lv_current is mounted on /; on-line resizing required Performing an on-line resize of /dev/mapper/vg_splat-lv_current to 3063808 (4k) blocks. The filesystem on /dev/mapper/vg_splat-lv_current is now 3063808 blocks long. viewing newly allocated disk space [Expert@chkpfw2:0]# df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 12G 3.6G 7.2G 33% / /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 2.2G 4.3G 34% /var/log So, we grew root while the system had it mounted and was running from it. Thank you LVM! 566 565 2015-12-04T07:06:03Z Nighthawk 1 wikitext text/x-wiki == Problem == insufficient disk space to apply an upgrade. O.S. : secure platform (splat) or gaia Check Point versions: multiple == Solution == Use available, unallocated disk space. Newer Check Point version use LVM. Check Point often doesn't allocate it all. This not a bad thing. It is a common, best practice with LVM. This allows admins to easily grow partitions as needed using the free disk space. If you allocated it all up front, but needed one partition bigger, you would have to shrink one to grow another. This is more complicated. With root, it can't be shrunk while the system is running(it can be grown as we are about to see). '''Example''' 20GB disk space [Expert@chkpfw2:0]# '''vgdisplay | grep -i size''' /dev/hdc: open failed: No medium found VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 384 / 12.00 GB Free PE / Size 214 / 6.69 GB [Expert@chkpfw1:0]# '''df -h''' Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 4.9G 3.6G 1.1G 77% / /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 3.7G 2.9G 57% /var/log adding 6 gig to the vg "container" [Expert@chkpfw2:0]# '''lvresize -L +6.69GB vg_splat/lv_current''' /dev/hdc: open failed: No medium found Rounding up size to full physical extent 6.72 GB Extending logical volume lv_current to 11.72 GB Insufficient free space: 215 extents needed, but only 214 available that failed... specifying the increase in GB is less precise. So, lets use "extents" [Expert@chkpfw2:0]# '''lvresize -l +214 vg_splat/lv_current''' /dev/hdc: open failed: No medium found Extending logical volume lv_current to 11.69 GB Logical volume lv_current successfully resized verifying resized volume group [Expert@chkpfw2:0]# vgdisplay | grep -i -E "name|size" /dev/hdc: open failed: No medium found VG Name vg_splat VG Size 18.69 GB PE Size 32.00 MB Alloc PE / Size 598 / 18.69 GB Free PE / Size 0 / 0 growing the file system to fill the "container" [Expert@chkpfw2:0]# '''resize2fs /dev/mapper/vg_splat-lv_current''' resize2fs 1.39 (29-May-2006) Filesystem at /dev/mapper/vg_splat-lv_current is mounted on /; on-line resizing required Performing an on-line resize of /dev/mapper/vg_splat-lv_current to 3063808 (4k) blocks. The filesystem on /dev/mapper/vg_splat-lv_current is now 3063808 blocks long. viewing newly allocated disk space [Expert@chkpfw2:0]# df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 12G 3.6G 7.2G 33% / /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 2.2G 4.3G 34% /var/log So, we grew root while the system had it mounted and was running from it. Thank you LVM! 565 2015-12-04T06:39:56Z Nighthawk 1 Created page with " Example 20GB disk space [Expert@chkpfw1:0]# '''df -h''' Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 4...." wikitext text/x-wiki Example 20GB disk space [Expert@chkpfw1:0]# '''df -h''' Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg_splat-lv_current 4.9G 3.6G 1.1G 77% / /dev/hda1 289M 24M 251M 9% /boot tmpfs 217M 0 217M 0% /dev/shm /dev/mapper/vg_splat-lv_log 6.8G 3.7G 2.9G 57% /var/log adding 6 gig... [Expert@chkpfw1:0]# '''lvresize -L +6GB vg_splat/lv_current''' Extending logical volume lv_current to 11.00 GB Logical volume lv_current successfully resized [Expert@chkpfw1:0]# '''resize2fs /dev/mapper/vg_splat-lv_current''' resize2fs 1.39 (29-May-2006) Filesystem at /dev/mapper/vg_splat-lv_current is mounted on /; on-line resizing required Performing an on-line resize of /dev/mapper/vg_splat-lv_current to 2883584 (4k) blocks. The filesystem on /dev/mapper/vg_splat-lv_current is now 2883584 blocks long. hit counter 0 218 689 688 2017-09-21T16:18:23Z Nighthawk 1 wikitext text/x-wiki == Prerequisites for hit counter functionality == Global Properties that must be enabled CLI to query(must be in CMA environment on an MDM) # cpmiquerybin object "" properties "name='firewall_properties'" | grep -i enable_hit_count :enable_hit_count (1) # cpmiquerybin object "" properties "name='firewall_properties'" | grep rulebase_uids_in_log :rulebase_uids_in_log (true) == max table size (on fw gateways) == [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk90040&partition=General&product=Security hit counter fw module max table size] sk90040 fw ctl get int fw_rules_uid_max_dic_entries fw ctl set int fw_rules_uid_max_dic_entries VALUE for surviving reboot... [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk26202 Changing the kernel global parameters for Check Point Security Gateway] 84c464db5e251863285f4e4171d2fd93b924c8af 688 2017-09-21T15:57:57Z Nighthawk 1 Created page with " [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk90040&partition=General&product=Security hit counter fw module ..." wikitext text/x-wiki [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk90040&partition=General&product=Security hit counter fw module max table size] sk90040 fw ctl get int fw_rules_uid_max_dic_entries fw ctl set int fw_rules_uid_max_dic_entries VALUE for surviving reboot... [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk26202 Changing the kernel global parameters for Check Point Security Gateway] c1ded3fd4e1d2e1ee13d99794749bb3ede966daf how stop annoying syslog messages to console on nokia ipso firewalls 0 154 427 2014-04-27T10:38:07Z Nighthawk 1 Created page with " dbset syslog:action:user:admin dbset syslog:action:user:admin:selector:all.err dbset syslog:action:user:admin:selector:auth.debug dbset syslog:action:user:all dbset sys..." wikitext text/x-wiki dbset syslog:action:user:admin dbset syslog:action:user:admin:selector:all.err dbset syslog:action:user:admin:selector:auth.debug dbset syslog:action:user:all dbset syslog:action:user:all:selector:all.emerg still a work in progress... [[category:nokia]] [[category:ipso]] how to determine corexl license support 0 109 199 2013-07-23T21:31:46Z Nighthawk 1 Created page with "How to determine the number of cores with CoreXL your firewall license supports. version: r70 license version: blade == license features == [admin]# cplic print Host ..." wikitext text/x-wiki How to determine the number of cores with CoreXL your firewall license supports. version: r70 license version: blade == license features == [admin]# cplic print Host Expiration Features 192.168.1.1 never CPAP-IP245X CPSB-FW CPSB-VPN CPSB-ADN CPSB-ACCL CPSB-IPS == find cp.macro == Support said to parse the cp.macro on the features above and look for a corresponding CPSG-C-x string, where x=maximum number of cores supported for CoreXL configuration by the license. In this example, the appliance license feature for the IP2450 nokia covers the CoreXL for up to 8 CPUs. [admin]# find / -name cp.macro /var/opt/CPsuite-R70/svn/conf/cp.macro # cat /var/opt/CPsuite-R70/svn/conf/cp.macro | grep -i cpsg-c ... output truncated MACRO ::CPAP-IP245x CPSG-C-8-U CPSG-U [[category:licensing]] how to increase the ring descriptor size on SecurePlatform 0 102 185 2013-07-18T22:31:39Z Nighthawk 1 Created page with "'''ring descriptor size set command''' ethtool -G ''interface_name'' rx ''SIZE'' tx '''SIZE''' To survive reboot, please add the above command to /etc/rc.local start-up scri..." wikitext text/x-wiki '''ring descriptor size set command''' ethtool -G ''interface_name'' rx ''SIZE'' tx '''SIZE''' To survive reboot, please add the above command to /etc/rc.local start-up script take from: Solution ID: sk60523 Product: SecurePlatform Version: R75 OS: SecurePlatform 2.6 [[category:NIC]] inspect 0 156 431 2014-05-02T06:01:59Z Nighthawk 1 Created page with " [http://etutorials.org/Networking/Check+Point+FireWall/Chapter+14.+INSPECT/Sample+INSPECT+Code/ http://etutorials.org/Networking/Check+Point+FireWall/Chapter+14.+INSPECT/Sa..." wikitext text/x-wiki [http://etutorials.org/Networking/Check+Point+FireWall/Chapter+14.+INSPECT/Sample+INSPECT+Code/ http://etutorials.org/Networking/Check+Point+FireWall/Chapter+14.+INSPECT/Sample+INSPECT+Code/] installing Check Point to Red Hat linux 0 142 656 383 2017-05-22T16:34:56Z Nighthawk 1 wikitext text/x-wiki == Version compatibility == as of 5-22-2017 see sk98760 and [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk44925 sk44925] for updates... R77.30/77.20(and some older versions): Red Hat linux 5.0, 5.4, 5.9, 6.5 R80.10: 5.5, 6.8, 7.3 For specifics regarding SmartCenter / MultiDomain (Provider-1)... [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_Hat_Enterprise_Linux_5 installing_Security_Management_on_Red_Hat_Enterprise_Linux_5] [[category:linux]] d7da380cc64bc767fb6eff07bc32fe20eaa0008a 383 382 2014-03-22T18:56:10Z Nighthawk 1 wikitext text/x-wiki == Version compatibility == R77 Base: Red Hat linux 5.0, 5.4 R77.10: Red Hat linux 5.0, 5.4 & 5.9 For specifics regarding SmartCenter / MultiDomain (Provider-1)... [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_Hat_Enterprise_Linux_5 installing_Security_Management_on_Red_Hat_Enterprise_Linux_5] [[category:linux]] 382 381 2014-03-22T18:56:00Z Nighthawk 1 wikitext text/x-wiki == Version compatibility == R77 Base: Red Hat linux 5.0, 5.4 R77.10: Red Hat linux 5.0, 5.4 & 5.9 For specifics regarding SmartCenter / MultiDomain (Provider-1)... [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_Hat_Enterprise_Linux_5 installing_Security_Management_on_Red_Hat_Enterprise_Linux_5] [[category:linux]] 381 380 2014-03-22T18:55:43Z Nighthawk 1 wikitext text/x-wiki == Version compatibility == R77 Base: Red Hat linux 5.0, 5.4 R77.10: Red Hat linux 5.0, 5.4 & 5.9 For specifics regarding SmartCenter / MultiDomain (Provider-1) [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_Hat_Enterprise_Linux_5 installing_Security_Management_on_Red_Hat_Enterprise_Linux_5] [[category:linux]] 380 2014-03-22T18:55:05Z Nighthawk 1 Created page with " == Version compatibility == R77 Base: Red Hat linux 5.0, 5.4 R77.10: Red Hat linux 5.0, 5.4 & 5.9 [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_..." wikitext text/x-wiki == Version compatibility == R77 Base: Red Hat linux 5.0, 5.4 R77.10: Red Hat linux 5.0, 5.4 & 5.9 [http://www.cpwiki.net/index.php/installing_Security_Management_on_Red_Hat_Enterprise_Linux_5 installing_Security_Management_on_Red_Hat_Enterprise_Linux_5] [[category:linux]] installing Security Management on Red Hat Enterprise Linux 5 0 115 591 379 2016-06-21T14:02:37Z Nighthawk 1 wikitext text/x-wiki This page gives some of the pre-requisite details / instructions if installing Check Point to a device running RedHat. It should also work for the open source version of RedHat... CentOS. Why install to one of these platforms??? because they are better than SPLAT or in some cases Gaia. SPLAT and Gaia are too stripped down and are missing basic utilities such as rsync. Gaia firewalls are decent with desirable functions built in like vrrp and clish. But a RedHat based SmartCenter or Provider-1 is hands down better than SPLAT or Gaia. Why do most Check Point customers run SPLAT / Gaia management devices? Usually it is just plain laziness. They want to grap and CD, shove it in a device, and follow the prompts to install and get it running. == Versions == This instructions are found in the Release Notes for the following versions... versions: Check Point R70, R71, and R75 == Install Instructions == '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm –i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. '''2. Install the compat-libstdc++-33-3.2.3-61 package''' a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm –qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm –i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. '''3. Disable SeLinux''' a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer. ==links== [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98760&partition=Advanced&product=Security] 9c03dea046c2a31967956d6cd134fc6d3ba84723 379 378 2014-03-22T16:35:54Z Nighthawk 1 wikitext text/x-wiki This page gives some of the pre-requisite details / instructions if installing Check Point to a device running RedHat. It should also work for the open source version of RedHat... CentOS. Why install to one of these platforms??? because they are better than SPLAT or in some cases Gaia. SPLAT and Gaia are too stripped down and are missing basic utilities such as rsync. Gaia firewalls are decent with desirable functions built in like vrrp and clish. But a RedHat based SmartCenter or Provider-1 is hands down better than SPLAT or Gaia. Why do most Check Point customers run SPLAT / Gaia management devices? Usually it is just plain laziness. They want to grap and CD, shove it in a device, and follow the prompts to install and get it running. == Versions == This instructions are found in the Release Notes for the following versions... versions: Check Point R70, R71, and R75 == Install Instructions == '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm –i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. '''2. Install the compat-libstdc++-33-3.2.3-61 package''' a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm –qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm –i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. '''3. Disable SeLinux''' a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer. 378 213 2014-03-22T16:34:06Z Nighthawk 1 wikitext text/x-wiki This page gives some of the pre-requisite details / instructions if installing Check Point to a device running RedHat. It should also work for the open source version of RedHat... CentOS. Why install to one of these platforms??? because they are better than SPLAT or in some cases Gaia. SPLAT and Gaia are too stripped down and are missing basic utilities such as rsync. Gaia firewalls are decent with desirable functions built in like vrrp and clish. But a RedHat based SmartCenter or Provider-1 is hands down better than SPLAT or Gaia. == Versions == This instructions are found in the Release Notes for the following versions... versions: Check Point R70, R71, and R75 == Install Instructions == '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm –i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. '''2. Install the compat-libstdc++-33-3.2.3-61 package''' a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm –qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm –i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. '''3. Disable SeLinux''' a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer. 213 212 2013-09-03T21:39:17Z Nighthawk 1 wikitext text/x-wiki '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm –i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. '''2. Install the compat-libstdc++-33-3.2.3-61 package''' a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm –qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm –i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. '''3. Disable SeLinux''' a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer. 212 2013-09-03T21:38:42Z Nighthawk 1 Created page with " '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 ..." wikitext text/x-wiki '''Before you install Security Management on Red Hat Enterprise Linux 5:''' '''1. Install the sharutils-4.6.1-2 package''' a) Make sure that you have the sharutils-4.6.1-2 package installed by running: rpm -qa | grep sharutils-4.6.1-2 b) If the package is not already installed, install it by running: rpm –i sharutils-4.6.1-2.i386.rpm This package can be found on CD 3 of RHEL 5. '''2. Install the compat-libstdc++-33-3.2.3-61 package''' a) Make sure that you have the compat-libstdc++-33-3.2.3-61 package by running: rpm –qa | grep compat-libstdc++-33-3.2.3-61 b) If the package is not already installed, install it by running: rpm –i compat-libstdc++-33-3.2.3-61.i386.rpm This package can be found on CD 2 of RHEL 5. '''3. Disable SeLinux''' a) Make sure that SeLinux is disabled by running: getenforce b) If SeLinux is enabled, disable it by setting SELINUX=disabled in the /etc/selinux/config file and rebooting the computer. interface monitoring via snmp 0 255 843 842 2020-06-19T18:45:32Z Nighthawk 1 wikitext text/x-wiki notes... page in progress [Expert@chkpfw1:0]# '''netstat -in''' Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 103695407 104 163 0 21955304 0 0 0 BMRU eth1 1500 0 84889247 3 0 0 134888 0 0 0 BMRU eth2 1500 0 51557348 0 0 0 0 0 0 0 BMRU lo 16436 0 7173067 0 0 0 7173067 0 0 0 LRU RX-DRP [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInDiscards.2''' IF-MIB::ifInDiscards.2 = Counter32: 163 RX-ERR [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInErrors.2''' IF-MIB::ifInErrors.2 = Counter32: 104 [Expert@chkpfw1:0]# '''snmpwalk -v 2c -c NAGIOS 192.168.1.2 | grep -i if.*UcastPkts''' IF-MIB::ifInUcastPkts.1 = Counter32: 7173335 IF-MIB::ifInUcastPkts.2 = Counter32: 103699664 IF-MIB::ifInUcastPkts.3 = Counter32: 84893047 IF-MIB::ifInUcastPkts.4 = Counter32: 51559644 IF-MIB::ifInNUcastPkts.1 = Counter32: 0 IF-MIB::ifInNUcastPkts.2 = Counter32: 0 IF-MIB::ifInNUcastPkts.3 = Counter32: 0 IF-MIB::ifInNUcastPkts.4 = Counter32: 0 IF-MIB::ifOutUcastPkts.1 = Counter32: 7173335 IF-MIB::ifOutUcastPkts.2 = Counter32: 21956198 IF-MIB::ifOutUcastPkts.3 = Counter32: 134891 IF-MIB::ifOutUcastPkts.4 = Counter32: 0 IF-MIB::ifOutNUcastPkts.1 = Counter32: 0 IF-MIB::ifOutNUcastPkts.2 = Counter32: 0 IF-MIB::ifOutNUcastPkts.3 = Counter32: 0 IF-MIB::ifOutNUcastPkts.4 = Counter32: 0 HOST-RESOURCES-MIB::hrSWRunParameters.28716 = STRING: "-i if.*UcastPkts" IF-MIB::ifHCInUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCInUcastPkts.2 = Counter64: 103699664 IF-MIB::ifHCInUcastPkts.3 = Counter64: 84893047 IF-MIB::ifHCInUcastPkts.4 = Counter64: 51559644 IF-MIB::ifHCOutUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCOutUcastPkts.2 = Counter64: 21956198 IF-MIB::ifHCOutUcastPkts.3 = Counter64: 134891 IF-MIB::ifHCOutUcastPkts.4 = Counter64: 0 aa2ee0fdd099e9ff41195251b93478c7f2e02c9a 842 841 2020-06-19T18:25:34Z Nighthawk 1 wikitext text/x-wiki notes... page in progress [Expert@chkpfw1:0]# '''netstat -in''' Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 103695407 104 163 0 21955304 0 0 0 BMRU eth1 1500 0 84889247 3 0 0 134888 0 0 0 BMRU eth2 1500 0 51557348 0 0 0 0 0 0 0 BMRU lo 16436 0 7173067 0 0 0 7173067 0 0 0 LRU RX-DRP [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInDiscards.2''' IF-MIB::ifInDiscards.2 = Counter32: 163 RX-ERR [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.1.2 IF-MIB::ifInErrors.2''' IF-MIB::ifInErrors.2 = Counter32: 104 [Expert@chkpfw1:0]# '''snmpwalk -v 2c -c NAGIOS 192.168.1.2 | grep -i if.*UcastPkts''' IF-MIB::ifInUcastPkts.1 = Counter32: 7173335 IF-MIB::ifInUcastPkts.2 = Counter32: 103699664 IF-MIB::ifInUcastPkts.3 = Counter32: 84893047 IF-MIB::ifInUcastPkts.4 = Counter32: 51559644 IF-MIB::ifInNUcastPkts.1 = Counter32: 0 IF-MIB::ifInNUcastPkts.2 = Counter32: 0 IF-MIB::ifInNUcastPkts.3 = Counter32: 0 IF-MIB::ifInNUcastPkts.4 = Counter32: 0 IF-MIB::ifOutUcastPkts.1 = Counter32: 7173335 IF-MIB::ifOutUcastPkts.2 = Counter32: 21956198 IF-MIB::ifOutUcastPkts.3 = Counter32: 134891 IF-MIB::ifOutUcastPkts.4 = Counter32: 0 IF-MIB::ifOutNUcastPkts.1 = Counter32: 0 IF-MIB::ifOutNUcastPkts.2 = Counter32: 0 IF-MIB::ifOutNUcastPkts.3 = Counter32: 0 IF-MIB::ifOutNUcastPkts.4 = Counter32: 0 HOST-RESOURCES-MIB::hrSWRunParameters.28716 = STRING: "-i if.*UcastPkts" IF-MIB::ifHCInUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCInUcastPkts.2 = Counter64: 103699664 IF-MIB::ifHCInUcastPkts.3 = Counter64: 84893047 IF-MIB::ifHCInUcastPkts.4 = Counter64: 51559644 IF-MIB::ifHCOutUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCOutUcastPkts.2 = Counter64: 21956198 IF-MIB::ifHCOutUcastPkts.3 = Counter64: 134891 IF-MIB::ifHCOutUcastPkts.4 = Counter64: 0 9c3e5a2ce0248b8d233382fd15e468bd028eae5a 841 840 2020-06-19T18:22:34Z Nighthawk 1 wikitext text/x-wiki notes... page in progress [Expert@chkpfw1:0]# '''netstat -in''' Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 103695407 104 163 0 21955304 0 0 0 BMRU eth1 1500 0 84889247 3 0 0 134888 0 0 0 BMRU eth2 1500 0 51557348 0 0 0 0 0 0 0 BMRU lo 16436 0 7173067 0 0 0 7173067 0 0 0 LRU RX-DRP [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.175.2 IF-MIB::ifInDiscards.2''' IF-MIB::ifInDiscards.2 = Counter32: 163 RX-ERR [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.175.2 IF-MIB::ifInErrors.2''' IF-MIB::ifInErrors.2 = Counter32: 104 [Expert@chkpfw1:0]# '''snmpwalk -v 2c -c NAGIOS 192.168.175.2 | grep -i if.*UcastPkts''' IF-MIB::ifInUcastPkts.1 = Counter32: 7173335 IF-MIB::ifInUcastPkts.2 = Counter32: 103699664 IF-MIB::ifInUcastPkts.3 = Counter32: 84893047 IF-MIB::ifInUcastPkts.4 = Counter32: 51559644 IF-MIB::ifInNUcastPkts.1 = Counter32: 0 IF-MIB::ifInNUcastPkts.2 = Counter32: 0 IF-MIB::ifInNUcastPkts.3 = Counter32: 0 IF-MIB::ifInNUcastPkts.4 = Counter32: 0 IF-MIB::ifOutUcastPkts.1 = Counter32: 7173335 IF-MIB::ifOutUcastPkts.2 = Counter32: 21956198 IF-MIB::ifOutUcastPkts.3 = Counter32: 134891 IF-MIB::ifOutUcastPkts.4 = Counter32: 0 IF-MIB::ifOutNUcastPkts.1 = Counter32: 0 IF-MIB::ifOutNUcastPkts.2 = Counter32: 0 IF-MIB::ifOutNUcastPkts.3 = Counter32: 0 IF-MIB::ifOutNUcastPkts.4 = Counter32: 0 HOST-RESOURCES-MIB::hrSWRunParameters.28716 = STRING: "-i if.*UcastPkts" IF-MIB::ifHCInUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCInUcastPkts.2 = Counter64: 103699664 IF-MIB::ifHCInUcastPkts.3 = Counter64: 84893047 IF-MIB::ifHCInUcastPkts.4 = Counter64: 51559644 IF-MIB::ifHCOutUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCOutUcastPkts.2 = Counter64: 21956198 IF-MIB::ifHCOutUcastPkts.3 = Counter64: 134891 IF-MIB::ifHCOutUcastPkts.4 = Counter64: 0 e99baf8848a10d865044028c471ce48958bcdfb1 840 2020-06-19T18:20:34Z Nighthawk 1 Created page with " [Expert@chkpfw1:0]# '''netstat -in''' Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 103695407..." wikitext text/x-wiki [Expert@chkpfw1:0]# '''netstat -in''' Kernel Interface table Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg eth0 1500 0 103695407 104 163 0 21955304 0 0 0 BMRU eth1 1500 0 84889247 3 0 0 134888 0 0 0 BMRU eth2 1500 0 51557348 0 0 0 0 0 0 0 BMRU lo 16436 0 7173067 0 0 0 7173067 0 0 0 LRU RX-DRP [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.175.2 IF-MIB::ifInDiscards.2''' IF-MIB::ifInDiscards.2 = Counter32: 163 RX-ERR [Expert@chkpfw1:0]# '''snmpget -v 2c -c NAGIOS 192.168.175.2 IF-MIB::ifInErrors.2''' IF-MIB::ifInErrors.2 = Counter32: 104 [Expert@chkpfw1:0]# '''snmpwalk -v 2c -c NAGIOS 192.168.175.2 | grep -i if.*UcastPkts''' IF-MIB::ifInUcastPkts.1 = Counter32: 7173335 IF-MIB::ifInUcastPkts.2 = Counter32: 103699664 IF-MIB::ifInUcastPkts.3 = Counter32: 84893047 IF-MIB::ifInUcastPkts.4 = Counter32: 51559644 IF-MIB::ifInNUcastPkts.1 = Counter32: 0 IF-MIB::ifInNUcastPkts.2 = Counter32: 0 IF-MIB::ifInNUcastPkts.3 = Counter32: 0 IF-MIB::ifInNUcastPkts.4 = Counter32: 0 IF-MIB::ifOutUcastPkts.1 = Counter32: 7173335 IF-MIB::ifOutUcastPkts.2 = Counter32: 21956198 IF-MIB::ifOutUcastPkts.3 = Counter32: 134891 IF-MIB::ifOutUcastPkts.4 = Counter32: 0 IF-MIB::ifOutNUcastPkts.1 = Counter32: 0 IF-MIB::ifOutNUcastPkts.2 = Counter32: 0 IF-MIB::ifOutNUcastPkts.3 = Counter32: 0 IF-MIB::ifOutNUcastPkts.4 = Counter32: 0 HOST-RESOURCES-MIB::hrSWRunParameters.28716 = STRING: "-i if.*UcastPkts" IF-MIB::ifHCInUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCInUcastPkts.2 = Counter64: 103699664 IF-MIB::ifHCInUcastPkts.3 = Counter64: 84893047 IF-MIB::ifHCInUcastPkts.4 = Counter64: 51559644 IF-MIB::ifHCOutUcastPkts.1 = Counter64: 7173335 IF-MIB::ifHCOutUcastPkts.2 = Counter64: 21956198 IF-MIB::ifHCOutUcastPkts.3 = Counter64: 134891 IF-MIB::ifHCOutUcastPkts.4 = Counter64: 0 4a504429ccbbe15f4f031a6c74f33babd0167e68 ipso - set backspace key to erase 0 87 140 2013-05-24T15:34:56Z Nighthawk 1 Created page with "set backspase key to erase (useful on older ipso versions like 4.1): # stty erase ^? (type in stty erase then ctrl-v then hit backspace and enter) [[category:check point..." wikitext text/x-wiki set backspase key to erase (useful on older ipso versions like 4.1): # stty erase ^? (type in stty erase then ctrl-v then hit backspace and enter) [[category:check point]] [[category:nokia]] ipso password history checking 0 152 421 2014-04-19T08:01:47Z Nighthawk 1 Created page with " to disable > set password-controls history-checking off to enable > set password-controls history-checking on [[category:nokia]] [[category:ipso]] [[category:clish]]" wikitext text/x-wiki to disable > set password-controls history-checking off to enable > set password-controls history-checking on [[category:nokia]] [[category:ipso]] [[category:clish]] isp redundancy 0 215 669 2017-07-24T03:52:32Z Nighthawk 1 Created page with " [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk23630 Advanced configuration options for ISP Redundancy]" wikitext text/x-wiki [https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk23630 Advanced configuration options for ISP Redundancy] 6fa89fa63dd1e4585974a35231d16177f55c0c65 jumpstart commands 0 126 287 2013-10-27T05:05:10Z Nighthawk 1 Created page with "remove temp jumpstart default route set static-route default nexthop gateway address <ip_address> off check anti-spoofing (from cma environment, on P-1) cpmiquerybin object..." wikitext text/x-wiki remove temp jumpstart default route set static-route default nexthop gateway address <ip_address> off check anti-spoofing (from cma environment, on P-1) cpmiquerybin object "" network_objects "name='<cluster_name>'" |grep anti_spoof cpmiquerybin object "" network_objects "name='<firewall_name>'" |grep anti_spoof [[category:scratch]] local firewall objects database 0 144 551 510 2015-01-21T17:09:00Z Nighthawk 1 /* commands to run locally on the firewall */ wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ==get smartcenter or CMA info== i=`grep -A 1 "Policy" $FWDIR/conf/masters | grep -v Policy`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}' == get logger and IP == this one works in bash on linux based firewalls or from bash in ipso [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 --- note: bash is not the default shell in ipso(csh is) --- swithing to bash in ipso mychkpfw[admin]# '''bash''' [root@mychkpfw ~]# <<< new bash prompt [[category:misc]] 510 509 2014-06-24T14:51:32Z Nighthawk 1 /* get logger and IP */ wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' == get logger and IP == this one works in bash on linux based firewalls or from bash in ipso [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 --- note: bash is not the default shell in ipso(csh is) --- swithing to bash in ipso mychkpfw[admin]# '''bash''' [root@mychkpfw ~]# <<< new bash prompt [[category:misc]] 509 508 2014-06-24T14:51:19Z Nighthawk 1 /* get logger and IP */ wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' == get logger and IP == this one works in bash on linux based firewalls or from bash in ipso [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 --- note: bash is not the devault shell in ipso(csh is) --- swithing to bash in ipso mychkpfw[admin]# '''bash''' [root@mychkpfw ~]# <<< new bash prompt [[category:misc]] 508 507 2014-06-24T14:51:09Z Nighthawk 1 /* get logger and IP */ wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' == get logger and IP == this one works in bash on linux based firewalls or from bash in ipso [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 ---note: bash is not the devault shell in ipso(csh is) --- swithing to bash in ipso mychkpfw[admin]# '''bash''' [root@mychkpfw ~]# <<< new bash prompt [[category:misc]] 507 489 2014-06-24T14:50:53Z Nighthawk 1 /* get logger and IP */ wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' == get logger and IP == this one works in bash on linux based firewalls or from bash in ipso [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 ---note: bash is not the devault shell in ipso(csh is) --- swithing to bash in ipso mychkpfw[admin]# '''bash''' [root@mychkpfw ~]# <<< new bash prompt [[category:misc]] 489 391 2014-05-29T15:27:22Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' == get logger and IP == this one works in bash on linux based firewalls (not ipso) [Expert@myfirewall]# '''i=`awk '/\[Log\]/{p=1;next}p &&/\[Alert\]/{p=0};p' $FWDIR/conf/masters`; grep -E ": \($i|ipaddr" $FWDIR/database/objects.C | grep -iA1 "$i"|tr -d "()":ipaddr | awk '{print $1}'''' my_clm 192.168.1.10 [[category:misc]] 391 390 2014-03-27T17:06:48Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. The problem is all that file presents is object names and you might what the associated IP address... but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 390 389 2014-03-27T17:05:48Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C == commands to run locally on the firewall == # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 389 388 2014-03-27T17:04:11Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="''object_name_goes_here''"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 388 387 2014-03-27T17:03:01Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with the object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 387 386 2014-03-27T17:00:09Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C # '''grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr''' objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with you object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 386 385 2014-03-27T16:59:50Z Nighthawk 1 wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C # grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with you object name of interest a little cleaner command for bash on SPLAT or Gaia # '''NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' ipso # '''set NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr''' [[category:misc]] 385 2014-03-27T16:59:29Z Nighthawk 1 Created page with "Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/con..." wikitext text/x-wiki Firewall Versions: R65 to R75 (tested) Object information such as IPs can be gathered locally on the firewall. This is useful for situations where you might cat $FWDIR/conf/masters to check the manager and logger configurations. You might what the associated IP address but not want to take the time to look it up on the GUI. The local firewall object information can be found in $FWDIR/database/objects.C # grep -A 200 -r ": (mysmartcenter" * $FWDIR/database/objects.C | grep -i ipaddr objects.C- :ipaddr (192.168.1.100) where ''mysmartcenter'' should be replaced with you object name of interest a little cleaner command for bash on SPLAT or Gaia # NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr ipso # set NAME="mysmartcenter"; grep -A 200 -r ": ($NAME" * $FWDIR/database/objects.C | grep -i ipaddr [[category:misc]] local firewall rules.C file 0 178 511 2014-07-03T17:54:57Z Nighthawk 1 Created page with " == file location == $FWDIR/database/rules.C" wikitext text/x-wiki == file location == $FWDIR/database/rules.C log connection verification 0 258 874 853 2022-09-15T13:48:12Z Nighthawk 1 wikitext text/x-wiki Expert@chkpfw2:0]# '''cpstat fw -f log_connection''' <br> Overall Status: 0 Overall Status Description: Security Gateway is reporting logs as defined Local Logging Mode Description: Logs are written to log server Local Logging Mode Status: 0 <br><br> Log Servers Connections -------------------------------------------- |IP |Status|Status Description | -------------------------------------------- |192.168.144.80| 0|Log-Server Connected| -------------------------------------------- netstat should show established connection to logging management server [Expert@chkpfw2:0]# '''netstat -an | grep -i "257.*ESTABLISHED"''' tcp 0 0 192.168.1.3:49571 192.168.1.80:257 ESTABLISHED fwd restart to re-establish log connections stop # cpwd_admin stop -name FWD -path "$FWDIR/bin/fw" -command "fw kill fwd" start # cpwd_admin start -name FWD -path "$FWDIR/bin/fw" -command "fwd" [[category:logging]] 49e95afbf6591748b9c7d91ce0ebdf6f529bf8a4 853 852 2021-04-02T16:11:07Z Nighthawk 1 wikitext text/x-wiki Expert@chkpfw2:0]# '''cpstat fw -f log_connection''' <br> Overall Status: 0 Overall Status Description: Security Gateway is reporting logs as defined Local Logging Mode Description: Logs are written to log server Local Logging Mode Status: 0 <br><br> Log Servers Connections -------------------------------------------- |IP |Status|Status Description | -------------------------------------------- |192.168.144.80| 0|Log-Server Connected| -------------------------------------------- netstat should show established connection to logging management server [Expert@chkpfw2:0]# '''netstat -an | grep -i "257.*ESTABLISHED"''' tcp 0 0 192.168.1.3:49571 192.168.1.80:257 ESTABLISHED [[category:logging]] d210a2ae71785ce8eaa79e7ef4f102104d5b928b 852 851 2021-04-02T16:10:55Z Nighthawk 1 wikitext text/x-wiki Expert@chkpfw2:0]# '''cpstat fw -f log_connection''' <br> Overall Status: 0 Overall Status Description: Security Gateway is reporting logs as defined Local Logging Mode Description: Logs are written to log server Local Logging Mode Status: 0 <br><br> Log Servers Connections -------------------------------------------- |IP |Status|Status Description | -------------------------------------------- |192.168.144.80| 0|Log-Server Connected| -------------------------------------------- netstat should show established connection to logging management server [Expert@chkpfw2:0]# '''netstat -an | grep -i "257.*ESTABLISHED"''' tcp 0 0 192.168.1.3:49571 192.168.1.80:257 ESTABLISHED [[category:logging]] e9b43ae3bb65651c33ebbd8bfce03642299bcbfc 851 2021-04-02T16:09:00Z Nighthawk 1 Created page with " Expert@chkpfw2:0]# '''cpstat fw -f log_connection''' <br> Overall Status: 0 Overall Status Description: Security Gateway is reporting logs as defined ..." wikitext text/x-wiki Expert@chkpfw2:0]# '''cpstat fw -f log_connection''' <br> Overall Status: 0 Overall Status Description: Security Gateway is reporting logs as defined Local Logging Mode Description: Logs are written to log server Local Logging Mode Status: 0 <br><br> Log Servers Connections -------------------------------------------- |IP |Status|Status Description | -------------------------------------------- |192.168.144.80| 0|Log-Server Connected| -------------------------------------------- [[category:logging]] c79e51eb99aeced41b4e8793156a6b301d698b30 maestro change Chassis/SGM up/down state 0 260 858 857 2021-04-11T01:00:42Z Nighthawk 1 wikitext text/x-wiki [Expert@MyChassis-ch01-01:0]# '''g_clusterXL_admin -b 1_1 up''' You are about to perform blade_admin up on blades: 1_1 This action will change members state <br>Are you sure? (Y - yes, any other key - no) y <br>Blade_admin up requires auditing Enter your full name: bob frapples Enter reason for blade_admin up [Maintenance]: WARNING: Blade_admin up on blades: 1_1, User: bob frapples, Reason: Maintenance <br>Members outputs: -*- 1 blade: 1_1 -*- Setting member to normal operation ... Member current state is ACTIVE [[category:maestro]] b846dd880277b1e5d592753722d2e20c9be9ae94 857 856 2021-04-11T01:00:01Z Nighthawk 1 wikitext text/x-wiki [Expert@MyChassis-ch01-01:0]# '''g_clusterXL_admin -b 1_1 up''' You are about to perform blade_admin up on blades: 1_1 This action will change members state <br>Are you sure? (Y - yes, any other key - no) y Blade_admin up requires auditing Enter your full name: bob frapples Enter reason for blade_admin up [Maintenance]: WARNING: Blade_admin up on blades: 1_1, User: bob frapples, Reason: Maintenance <br>Members outputs: -*- 1 blade: 1_1 -*- Setting member to normal operation ... Member current state is ACTIVE [[category:maestro]] 7c8efbb8a5d0ee17391d7d75ed5617bd384dad90 856 2021-04-11T00:59:02Z Nighthawk 1 Created page with " [Expert@MyChassis-ch01-01:0]# '''g_clusterXL_admin -b 1_1 up''' You are about to perform blade_admin up on blades: 1_1 This action will change members state <br> Are you ..." wikitext text/x-wiki [Expert@MyChassis-ch01-01:0]# '''g_clusterXL_admin -b 1_1 up''' You are about to perform blade_admin up on blades: 1_1 This action will change members state <br> Are you sure? (Y - yes, any other key - no) y <br> Blade_admin up requires auditing Enter your full name: bob frapples Enter reason for blade_admin up [Maintenance]: WARNING: Blade_admin up on blades: 1_1, User: bob frapples, Reason: Maintenance <br> Members outputs: -*- 1 blade: 1_1 -*- Setting member to normal operation ... Member current state is ACTIVE [[category:maestro]] afd6b8d8643452ee6b39c6b1b15ea193a42d8698 maestro reference 0 262 909 884 2024-05-13T16:39:23Z Nighthawk 1 wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other UP members. Use [[asg policy - command|asg policy]] to verify or unload a policy. ===Synchronizing Policy and Configuration Between Security Group Members=== synchronize the policies manually to a SG member asg_blade_config pull_config ==Managing Security Groups== ===Connecting to a Specific Security Group Member === # member <Member ID> or # m <Member ID> connecting to member in specific SG # m <Security Group ID> <Member ID> ==HA== clusterXL_admin up ==orchestrator== get port transiever typoe > show maestro port x optic info e6056039e719b39bffab078b4649441f77f0c99a 884 883 2023-10-21T13:56:38Z Nighthawk 1 wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other UP members. Use [[asg policy - command|asg policy]] to verify or unload a policy. ===Synchronizing Policy and Configuration Between Security Group Members=== synchronize the policies manually to a SG member asg_blade_config pull_config ==Managing Security Groups== ===Connecting to a Specific Security Group Member === # member <Member ID> or # m <Member ID> connecting to member in specific SG # m <Security Group ID> <Member ID> ==HA== clusterXL_admin up 28213f3f4307579db48c39957eb890406f5265a1 883 882 2023-10-20T21:57:25Z Nighthawk 1 /* policy installation */ wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other UP members. Use [[asg policy - command|asg policy]] to verify or unload a policy. ===Synchronizing Policy and Configuration Between Security Group Members=== synchronize the policies manually to a SG member asg_blade_config pull_config ==HA== clusterXL_admin up 0a25543c2aa2eafa1480b317f6fdcac6875814cc 882 881 2023-10-20T21:42:30Z Nighthawk 1 /* policy installation */ wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other members. Use [[asg policy - command|asg policy]] to verify or unload a policy. 3562fa65f69ea8f353db19afb877dcd08499f8ba 881 876 2023-10-20T21:42:00Z Nighthawk 1 /* policy installation */ wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other members. Use [[asg policy - manpage|asg policy]] to verify or unload a policy. 25f0df98452d48dd5c6bf4ec880b6cfc1fe265ca 876 2023-10-20T21:28:26Z Nighthawk 1 Created page with "==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. ..." wikitext text/x-wiki ==security groups== Single Management Object (SMO) handles all management tasks, such as Security Gateway configuration, policy installation, remote connections, and logging. The Active Security Group Member with the lowest ID number is automatically assigned to be the SMO. identify the SMO and tasks # asg stat -i tasks ===policy installation=== Management ServerClosed installs the policy on the SMO Master and then it is copied to the other members. 7cf06d9cbc98321094ac8112dfe82c9b68d82d46 maestro setup 0 259 855 854 2021-04-10T02:18:14Z Nighthawk 1 wikitext text/x-wiki single site and single MHO version r80.20 mho-140 connected downlink ports connect to MHO via mgmt port 0 on the back on default ip of 192.168.1.1 ssh to the orchestrator amount to 1 as the default is 2, at clish run set maestro configuration orchestrator-amount 1 save config if this step is skipped you will receive error message: "Fail to load security groups" click on "orchestrator" on the left should see appliances under unassigned gateways .... gclish >set smo image auto-clone state on misc commands asg_policy unload 037d5f0a0b4dfeb7413f5b4e4ab4bbab6e68c58a 854 2021-04-08T18:33:29Z Nighthawk 1 Created page with "single site and single MHO version r80.20 mho-140 connected downlink ports connect to MHO via mgmt port 0 on the back on default ip of 192.168.1.1 ssh to the orchestrator..." wikitext text/x-wiki single site and single MHO version r80.20 mho-140 connected downlink ports connect to MHO via mgmt port 0 on the back on default ip of 192.168.1.1 ssh to the orchestrator amount to 1 as the default is 2, at clish run set maestro configuration orchestrator-amount 1 save config if this step is skipped you will receive error message: "Fail to load security groups" click on "orchestrator" on the left should see appliances under unassigned gateways a7aa933d3ed77c680cfea1a7df69ea5a16244d3a manager to firewall services 0 224 705 2018-01-19T20:13:33Z Nighthawk 1 Created page with "manager / mgmt / MDM / CMA / smartcenter to firewall fw1 - tcp 256 <br>fw1_lea - tcp 18184 <br>fw1_sam - tcp 18183 <br>fw1_ica_push - tcp 18211 <br>cpd <br>cpd_amon <br>fw1_c..." wikitext text/x-wiki manager / mgmt / MDM / CMA / smartcenter to firewall fw1 - tcp 256 <br>fw1_lea - tcp 18184 <br>fw1_sam - tcp 18183 <br>fw1_ica_push - tcp 18211 <br>cpd <br>cpd_amon <br>fw1_cprid <br>cpmi 6e7b075b45d3a049a542156ecb2d4acbad560e41 manual upgrade notes 0 223 703 2017-11-19T06:42:36Z Nighthawk 1 Created page with "77.20 to 77.30 installer verions check... ..." wikitext text/x-wiki 77.20 to 77.30 installer verions check... cpvinfo $DADIR/bin/DAService | grep Build upgrade installer rpm -Uhv --force CPda-00-00.i386-1278.rpm check base fw ver installer import local Check_Point_R77.30_T204_Install_and_Upgrade.tgz installer install Check_Point_R77.30_T204_Install_and_Upgrade.tgz rebooted by installer 77.30 to hotfix to post build script touch /etc/.wizard_accepted cpconfig rpm -ihv --force CPppak-R77-00.i386.rpm reboot cpconfig to enable securexl (not needed) cpconfig to configure corexl instances <br>configure $FWDIR/boot/modules/fwkern.conf <br>(13800 example) <br>fwx_nat_dynamic_port_allocation=1 <br>fwx_old_icmp_nat=1 <br>fw_drop_icmp_errors_over_tcp=1 <br>fwkern_optimize_drops_support=1 <br>fwha_monitor_if_link_state=0 clish> set core-dump enable reboot installer import local Check_Point_R77_30_JUMBO_HF_1_Bundle_T216_FULL.tgz installer install Check_Point_R77_30_JUMBO_HF_1_Bundle_T216_FULL.tgz reboot (installer) # mkdir HF_INSTALL # cd HF_INSTALL # tar xvfz ../SecurePlatform_HOTFIX_R7730_T216_JHF_879.tgz #./SecurePlatform_HOTFIX_R7730_T216_JHF_879_990879001_1 reboot baf6355bcf7d30e84c7fb6854a29df11a8e1ae73 mds backup 0 114 211 210 2013-08-29T05:32:06Z Nighthawk 1 wikitext text/x-wiki backup and don't ask me any dumb questions. # mds_backup -l -b -d /var/backup/ == Exclude file== $MDSDIR/conf/mds_exclude.dat keywords:mdsbackup mds backup 210 209 2013-08-28T13:34:40Z Nighthawk 1 wikitext text/x-wiki ... == Exclude file== $MDSDIR/conf/mds_exclude.dat 209 2013-08-28T13:31:22Z Nighthawk 1 Created page with "..." wikitext text/x-wiki ... mgmt cli examples 0 193 585 2016-06-07T18:31:31Z Nighthawk 1 Created page with "dump all rules mgmt_cli show-access-rulebase name Network use-object-dictionary false -u jsmith -p abc123" wikitext text/x-wiki dump all rules mgmt_cli show-access-rulebase name Network use-object-dictionary false -u jsmith -p abc123 13832a1316ca04116ac3484ccca055175be69549 mgmt cli on ubuntu 0 248 829 2019-05-14T16:10:45Z Nighthawk 1 Created page with "[https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/mgmt-cli-on-Ubuntu/td-p/28706 mgmt_cli on ubuntu] [[category:api]]" wikitext text/x-wiki [https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/mgmt-cli-on-Ubuntu/td-p/28706 mgmt_cli on ubuntu] [[category:api]] 9c607a26e39719db84048e6f7c7a2f98a2409268 nagios 0 176 495 494 2014-06-08T21:03:08Z Nighthawk 1 wikitext text/x-wiki [http://patrick.proy.free.fr/nagios/index_commands.html] [[category:monitoring]] 494 2014-06-08T21:02:51Z Nighthawk 1 Created page with "[http://patrick.proy.free.fr/nagios/index_commands.html]" wikitext text/x-wiki [http://patrick.proy.free.fr/nagios/index_commands.html] nokia - Enabling/Disabling SSH Service 0 89 143 2013-05-24T15:36:36Z Nighthawk 1 Created page with "== Enabling/Disabling SSH Service == enable ssh set ssh server enable <0 | 1> check show ssh server enable [[category:check point]] [[category:nokia]]" wikitext text/x-wiki == Enabling/Disabling SSH Service == enable ssh set ssh server enable <0 | 1> check show ssh server enable [[category:check point]] [[category:nokia]] nokia - enable write access to /images/current directory 0 78 120 119 2013-05-24T15:07:47Z Nighthawk 1 wikitext text/x-wiki mount -u / [[category:check point]] [[category:nokia]] 119 2013-05-24T15:07:16Z Nighthawk 1 Created page with " mount -u / [[category:nokia]]" wikitext text/x-wiki mount -u / [[category:nokia]] nokia - get amount of physical memory / RAM 0 84 132 2013-05-24T15:28:28Z Nighthawk 1 Created page with "determine amount of physical RAM: # dmesg|grep "real memory" [[category:check point]] [[category:nokia]]" wikitext text/x-wiki determine amount of physical RAM: # dmesg|grep "real memory" [[category:check point]] [[category:nokia]] nokia - get model / appliance number 0 82 502 476 2014-06-12T15:07:42Z Nighthawk 1 wikitext text/x-wiki works on all ipso versions this is slow but it works... # ipsctl -a | grep eeprom | grep "hw:eeprom:product_id =" | awk -F "=" '{print $2}' | sed 's/^[ \t]*//' or for ipso 6.x # clish -c '''"show asset hardware"''' [[category:check point]] [[category:nokia]] 476 475 2014-05-21T15:08:34Z Nighthawk 1 wikitext text/x-wiki works on all ipso versions # '''ipsctl -a |grep eeprom | grep product_id''' or for ipso 6.x # clish -c '''"show asset hardware"''' [[category:check point]] [[category:nokia]] 475 474 2014-05-21T15:07:33Z Nighthawk 1 wikitext text/x-wiki works on all ipso versions # ipsctl -a |grep eeprom | grep product_id or for ipso 6.x # show asset hardware [[category:check point]] [[category:nokia]] 474 130 2014-05-21T15:06:56Z Nighthawk 1 wikitext text/x-wiki works on all ipso versions # ???? or for ipso 6.x # show asset hardware [[category:check point]] [[category:nokia]] 130 2013-05-24T15:25:37Z Nighthawk 1 Created page with "works on all ipso versions # echo show vrrp int | iclid | grep -v priority or for ipso 6.x # show asset hardware [[category:check point]] [[category:nokia]]" wikitext text/x-wiki works on all ipso versions # echo show vrrp int | iclid | grep -v priority or for ipso 6.x # show asset hardware [[category:check point]] [[category:nokia]] nokia - get route to destination 0 85 137 136 2013-05-24T15:32:20Z Nighthawk 1 wikitext text/x-wiki route get to specific destination: run from iclid iclid> '''sh route dest''' or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connected, S - static, I - IGRP, R - RIP, B - BGP, O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA), A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed <br> S 192.168/16 via 10.10.1.254 eth1c0, cost 0, age 8939695 [[category:check point]] [[category:nokia]] 136 135 2013-05-24T15:32:10Z Nighthawk 1 wikitext text/x-wiki route get to specific destination: run from iclid iclid> sh route dest or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connected, S - static, I - IGRP, R - RIP, B - BGP, O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA), A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed <br> S 192.168/16 via 10.10.1.254 eth1c0, cost 0, age 8939695 [[category:check point]] [[category:nokia]] 135 134 2013-05-24T15:32:04Z Nighthawk 1 wikitext text/x-wiki route get to specific destination: run from iclid iclid> sh route dest or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connected, S - static, I - IGRP, R - RIP, B - BGP, O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA), A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed <br> S 192.168/16 via 10.10.1.254 eth1c0, cost 0, age 8939695 [[category:check point]] [[category:nokia]] 134 133 2013-05-24T15:31:53Z Nighthawk 1 wikitext text/x-wiki route get to specific destination: run from iclid iclid> sh route dest or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connected, S - static, I - IGRP, R - RIP, B - BGP, O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA), <br> A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed S 192.168/16 via 10.10.1.254 eth1c0, cost 0, age 8939695 [[category:check point]] [[category:nokia]] 133 2013-05-24T15:31:36Z Nighthawk 1 Created page with " route get to specific destination: run from iclid iclid> sh route dest or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connect..." wikitext text/x-wiki route get to specific destination: run from iclid iclid> sh route dest or from shell... example: # '''echo show route dest 192.168.1.1 | iclid''' Codes: C - connected, S - static, I - IGRP, R - RIP, B - BGP, O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA), A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed <br> S 192.168/16 via 10.10.1.254 eth1c0, cost 0, age 8939695 [[category:check point]] [[category:nokia]] nokia - get serial number 0 83 131 2013-05-24T15:27:49Z Nighthawk 1 Created page with "serial number: # ipsctl -a | grep serial [[category:check point]] [[category:nokia]]" wikitext text/x-wiki serial number: # ipsctl -a | grep serial [[category:check point]] [[category:nokia]] nokia - time since last vrrp faillover 0 81 478 129 2014-05-24T20:37:56Z Nighthawk 1 wikitext text/x-wiki '''time since last failover''' run from shell # clish -c "show vrrp interfaces"| grep -i time or # echo show vrrp int | iclid |grep -E "State|Interface" [[category:check point]] [[category:nokia]] 129 2013-05-24T15:22:16Z Nighthawk 1 Created page with " '''time since last failover''' run from shell # echo show vrrp int | iclid |grep -E "State|Interface" [[category:check point]] [[category:nokia]]" wikitext text/x-wiki '''time since last failover''' run from shell # echo show vrrp int | iclid |grep -E "State|Interface" [[category:check point]] [[category:nokia]] nokia aggregate interface setup via CLI 0 96 602 156 2016-08-05T05:02:19Z Nighthawk 1 wikitext text/x-wiki set member interface parameters, then must all match clish -c "set interface eth-s4p2 duplex full" clish -c "set interface eth-s4p3 duplex full" clish -c "set interface eth-s4p4 duplex full" clish -c "set interface eth-s4p2 speed 1000M" clish -c "set interface eth-s4p3 speed 1000M" clish -c "set interface eth-s4p4 speed 1000M" add interfaces above to group (need to create group 1st?... not sure) clish -c "add linkaggregation group 1" clish -c "add linkaggregation group 1 port eth-s4p2 type primary" clish -c "add linkaggregation group 1 port eth-s4p3" clish -c "add linkaggregation group 1 port eth-s4p4" configure aggregate interface  clish -c "set interface ae1 active on" clish -c "set interface ae1 duplex full" clish -c "set interface ae1 speed 3000M" clish -c "set interface ae1c0 logical-name ae1c0" clish -c "add interface ae1c0 address 192.168.1.1/24" [[category:nokia]] a5ba5908da1364abee26961aecb2c88e61a52ed7 156 2013-07-03T14:41:52Z Nighthawk 1 Created page with "set member interface parameters, then must all match clish -c "set interface eth-s4p2 duplex full" clish -c "set interface eth-s4p3 duplex full" clish -c "set interface eth..." wikitext text/x-wiki set member interface parameters, then must all match clish -c "set interface eth-s4p2 duplex full" clish -c "set interface eth-s4p3 duplex full" clish -c "set interface eth-s4p4 duplex full" clish -c "set interface eth-s4p2 speed 1000M" clish -c "set interface eth-s4p3 speed 1000M" clish -c "set interface eth-s4p4 speed 1000M" add interfaces above to group (need to create group 1st?... not sure) clish -c "add linkaggregation group 1" clish -c "add linkaggregation group 1 port eth-s4p2 type primary" clish -c "add linkaggregation group 1 port eth-s4p3" clish -c "add linkaggregation group 1 port eth-s4p4" configure aggregate interface  clish -c "set interface ae1 active on" clish -c "set interface ae1 duplex full" clish -c "set interface ae1 speed 3000M" clish -c "set interface ae1c0 logical-name ae1c0" clish -c "add interface ae1c0 address 10.206.15.1/30" [[category:nokia]] nokia config active routes and arps 0 127 302 2013-11-05T04:49:29Z Nighthawk 1 Created page with " == to get a backup / snapshot of routes... == # cat /config/active | grep static == proxy arps == # cat /config/active | grep -i arp | grep proxy-only | grep macaddr [[c..." wikitext text/x-wiki == to get a backup / snapshot of routes... == # cat /config/active | grep static == proxy arps == # cat /config/active | grep -i arp | grep proxy-only | grep macaddr [[category:nokia]] nokia cpu info 0 105 190 189 2013-07-19T17:38:40Z Nighthawk 1 wikitext text/x-wiki command to gather cpu information. The number of CPU cores can be determined as well. '''Example:'''[[Link title]] (from IP2450) nokiafw[admin]# '''ipsctl -a |grep -i cpu''' kern:nokfw:callouts:CPU:0 = 0 kern:nokfw:callouts:CPU:1 = 0 kern:nokfw:callouts:CPU:2 = 927044562 kern:nokfw:callouts:CPU:3 = 55679468 kern:nokfw:callouts:CPU:4 = 55682630 kern:nokfw:callouts:CPU:5 = 55682991 kern:nokfw:callouts:CPU:6 = 55680200 kern:nokfw:callouts:CPU:7 = 55680035 net:taskq:id:0:irq_cpu = 0 net:taskq:id:1:irq_cpu = 1 net:ip:cluster:cpu_type = 0 net:ip:cluster:cpu_speed = 0 hw:sys_stat:temp:8:location = CPU8 TEMPERATURE hw:sys_stat:temp:7:location = CPU7 TEMPERATURE hw:sys_stat:temp:6:location = CPU6 TEMPERATURE hw:sys_stat:temp:5:location = CPU5 TEMPERATURE hw:sys_stat:temp:4:location = CPU4 TEMPERATURE hw:sys_stat:temp:3:location = CPU3 TEMPERATURE hw:sys_stat:temp:2:location = CPU2 TEMPERATURE hw:sys_stat:temp:1:location = CPU1 TEMPERATURE hw:sys_stat:volt:11:location = CPU2_CORE-V w:sys_stat:volt:3:location = CPU1_CORE-V hw:sys_stat:fan:12:location = CPU2_FAN2 hw:sys_stat:fan:11:location = CPU2_FAN1 hw:sys_stat:fan:10:location = CPU1_FAN2 hw:sys_stat:fan:9:location = CPU1_FAN1 hw:cpu_topo:0:mask = 15 hw:cpu_topo:0:child:0:mask = 3 hw:cpu_topo:0:child:1:mask = 12 hw:cpu_topo:1:mask = 240 hw:cpu_topo:1:child:0:mask = 48 hw:cpu_topo:1:child:1:mask = 192 hw:ncpupkgs = 2 hw:cpu:0:freq = 2660 hw:cpu:0:model = Intel(R) Xeon(R) CPU X5355 @ 2.66GHz hw:cpu:0:mfr = GenuineIntel 189 2013-07-19T17:38:28Z Nighthawk 1 Created page with "command to gather cpu information. The number of CPUs can be determined as well. '''Example:'''[[Link title]] (from IP2450) nokiafw[admin]# '''ipsctl -a |grep -i cpu''' ..." wikitext text/x-wiki command to gather cpu information. The number of CPUs can be determined as well. '''Example:'''[[Link title]] (from IP2450) nokiafw[admin]# '''ipsctl -a |grep -i cpu''' kern:nokfw:callouts:CPU:0 = 0 kern:nokfw:callouts:CPU:1 = 0 kern:nokfw:callouts:CPU:2 = 927044562 kern:nokfw:callouts:CPU:3 = 55679468 kern:nokfw:callouts:CPU:4 = 55682630 kern:nokfw:callouts:CPU:5 = 55682991 kern:nokfw:callouts:CPU:6 = 55680200 kern:nokfw:callouts:CPU:7 = 55680035 net:taskq:id:0:irq_cpu = 0 net:taskq:id:1:irq_cpu = 1 net:ip:cluster:cpu_type = 0 net:ip:cluster:cpu_speed = 0 hw:sys_stat:temp:8:location = CPU8 TEMPERATURE hw:sys_stat:temp:7:location = CPU7 TEMPERATURE hw:sys_stat:temp:6:location = CPU6 TEMPERATURE hw:sys_stat:temp:5:location = CPU5 TEMPERATURE hw:sys_stat:temp:4:location = CPU4 TEMPERATURE hw:sys_stat:temp:3:location = CPU3 TEMPERATURE hw:sys_stat:temp:2:location = CPU2 TEMPERATURE hw:sys_stat:temp:1:location = CPU1 TEMPERATURE hw:sys_stat:volt:11:location = CPU2_CORE-V w:sys_stat:volt:3:location = CPU1_CORE-V hw:sys_stat:fan:12:location = CPU2_FAN2 hw:sys_stat:fan:11:location = CPU2_FAN1 hw:sys_stat:fan:10:location = CPU1_FAN2 hw:sys_stat:fan:9:location = CPU1_FAN1 hw:cpu_topo:0:mask = 15 hw:cpu_topo:0:child:0:mask = 3 hw:cpu_topo:0:child:1:mask = 12 hw:cpu_topo:1:mask = 240 hw:cpu_topo:1:child:0:mask = 48 hw:cpu_topo:1:child:1:mask = 192 hw:ncpupkgs = 2 hw:cpu:0:freq = 2660 hw:cpu:0:model = Intel(R) Xeon(R) CPU X5355 @ 2.66GHz hw:cpu:0:mfr = GenuineIntel nokia cpu monitoring 0 157 558 432 2015-07-27T12:20:25Z Nighthawk 1 wikitext text/x-wiki view individual cpu stats # top -SHp last pid: 61252; load averages: 0.31, 0.37, 0.35 up 229+17:51:01 21:24:55 132 processes: 9 running, 97 sleeping, 1 zombie, 25 waiting CPU00: 0.5% user, 0.0% nice, 3.5% system, 4.5% interrupt, 91.5% idle CPU01: 0.0% user, 0.0% nice, 0.4% system, 5.4% interrupt, 94.2% idle CPU02: 0.0% user, 0.0% nice, 0.6% system, 2.9% interrupt, 96.5% idle CPU03: 0.1% user, 0.0% nice, 0.4% system, 2.0% interrupt, 97.6% idle CPU04: 0.3% user, 0.0% nice, 1.1% system, 4.0% interrupt, 94.7% idle CPU05: 0.1% user, 0.0% nice, 0.7% system, 2.5% interrupt, 96.7% idle CPU06: 0.0% user, 0.0% nice, 0.2% system, 4.7% interrupt, 95.1% idle CPU07: 0.0% user, 0.0% nice, 0.1% system, 3.2% interrupt, 96.6% idle Mem: 320M Active, 365M Inact, 1173M Wired, 8K Cache, 99M Buf, 641M Free Swap: 8192M Total, 8192M Free PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 14 root 171 52 0K 16K CPU3 3 5325.8 100.00% idle: cpu3 12 root 171 52 0K 16K CPU5 5 5314.1 100.00% idle: cpu5 15 root 171 52 0K 16K CPU2 2 5247.5 100.00% idle: cpu2 13 root 171 52 0K 16K RUN 4 5225.1 97.46% idle: cpu4 10 root 171 52 0K 16K CPU7 7 5298.0 95.46% idle: cpu7 11 root 171 52 0K 16K CPU6 6 5294.7 95.36% idle: cpu6 16 root 171 52 0K 16K CPU1 1 5285.3 94.48% idle: cpu1 variation # top -mio -SHp [[category:nokia]] [[category:performance]] 432 2014-05-02T21:28:04Z Nighthawk 1 Created page with "view individual cpu stats # top -SHp last pid: 61252; load averages: 0.31, 0.37, 0.35 up 229+17:51:01 21:2..." wikitext text/x-wiki view individual cpu stats # top -SHp last pid: 61252; load averages: 0.31, 0.37, 0.35 up 229+17:51:01 21:24:55 132 processes: 9 running, 97 sleeping, 1 zombie, 25 waiting CPU00: 0.5% user, 0.0% nice, 3.5% system, 4.5% interrupt, 91.5% idle CPU01: 0.0% user, 0.0% nice, 0.4% system, 5.4% interrupt, 94.2% idle CPU02: 0.0% user, 0.0% nice, 0.6% system, 2.9% interrupt, 96.5% idle CPU03: 0.1% user, 0.0% nice, 0.4% system, 2.0% interrupt, 97.6% idle CPU04: 0.3% user, 0.0% nice, 1.1% system, 4.0% interrupt, 94.7% idle CPU05: 0.1% user, 0.0% nice, 0.7% system, 2.5% interrupt, 96.7% idle CPU06: 0.0% user, 0.0% nice, 0.2% system, 4.7% interrupt, 95.1% idle CPU07: 0.0% user, 0.0% nice, 0.1% system, 3.2% interrupt, 96.6% idle Mem: 320M Active, 365M Inact, 1173M Wired, 8K Cache, 99M Buf, 641M Free Swap: 8192M Total, 8192M Free PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 14 root 171 52 0K 16K CPU3 3 5325.8 100.00% idle: cpu3 12 root 171 52 0K 16K CPU5 5 5314.1 100.00% idle: cpu5 15 root 171 52 0K 16K CPU2 2 5247.5 100.00% idle: cpu2 13 root 171 52 0K 16K RUN 4 5225.1 97.46% idle: cpu4 10 root 171 52 0K 16K CPU7 7 5298.0 95.46% idle: cpu7 11 root 171 52 0K 16K CPU6 6 5294.7 95.36% idle: cpu6 16 root 171 52 0K 16K CPU1 1 5285.3 94.48% idle: cpu1 [[category:nokia]] [[category:performance]] nokia db debug mode via console 0 125 429 428 2014-04-30T19:40:21Z Nighthawk 1 moved [[console]] to [[nokia db debug mode via console]] wikitext text/x-wiki == nokia db debug mode via console == This article desribes how to break, interrupt, debug or reboot a nokia from the console... without having to login to a tty. To do so, we need to... 1. Send a break via the console 2. Enter the debug mode == Send break == for a WTI scm, send break by default is '''ctrl \''' for a telnet console, '''ctrl ]''' then at the telnet prompt... telnet> send break <enter> == Enter debug mode == on nokia firewalls, after the send break there is no "feedback". To enter ipso debug mode, type the following within a couple of seconds following the send break '''ddb <enter>''' if successful, you will see the following prompt... db> type help for a list of available commands. these vary by platform. db> '''help''' print p examine x search set write w delete d break b dwatch watch dhwatch hwatch step s continue c until next match trace t alltrace where bt call show ps gdb halt reboot reset kill watchdog thread panic if you want to reboot, and the option isn't present as above, use panic. [[category:console]] 428 278 2014-04-30T19:39:59Z Nighthawk 1 wikitext text/x-wiki == nokia db debug mode via console == This article desribes how to break, interrupt, debug or reboot a nokia from the console... without having to login to a tty. To do so, we need to... 1. Send a break via the console 2. Enter the debug mode == Send break == for a WTI scm, send break by default is '''ctrl \''' for a telnet console, '''ctrl ]''' then at the telnet prompt... telnet> send break <enter> == Enter debug mode == on nokia firewalls, after the send break there is no "feedback". To enter ipso debug mode, type the following within a couple of seconds following the send break '''ddb <enter>''' if successful, you will see the following prompt... db> type help for a list of available commands. these vary by platform. db> '''help''' print p examine x search set write w delete d break b dwatch watch dhwatch hwatch step s continue c until next match trace t alltrace where bt call show ps gdb halt reboot reset kill watchdog thread panic if you want to reboot, and the option isn't present as above, use panic. [[category:console]] 278 2013-09-28T03:26:43Z Nighthawk 1 Created page with "WTI scm send break '''ctrl \''' on nokia firewalls, after the send break there is no "feedback". To enter ipso debug mode: '''ddb''' db> type help for a list of av..." wikitext text/x-wiki WTI scm send break '''ctrl \''' on nokia firewalls, after the send break there is no "feedback". To enter ipso debug mode: '''ddb''' db> type help for a list of available commands. these vary by platform. db> '''help''' print p examine x search set write w delete d break b dwatch watch dhwatch hwatch step s continue c until next match trace t alltrace where bt call show ps gdb halt reboot reset kill watchdog thread panic [[category:console]] nokia firewall boot manager upgrade command 0 58 286 285 2013-10-24T04:28:11Z Nighthawk 1 wikitext text/x-wiki '''bootmgr upgrade cmds''' '''ipso 6.x''' upgrade_bootmgr /var/emhome/admin/nkipflash-6.2-GA029a02.bin '''ipso 4.1(needs device parameter)''' to check/determine boot manager device number... ipsctl kern:bootmgr:bmdev where X = device number from above upgrade_bootmgr /dev/wdX /var/emhome/admin/nkipflash-6.2-GA029a02.bin example: upgrade_bootmgr /dev/wd1 /var/emhome/admin/nkipflash-6.2-GA029a02.bin [[category:nokia]] 285 67 2013-10-24T04:27:59Z Nighthawk 1 wikitext text/x-wiki '''bootmgr upgrade cmds''' '''ipso 6.x''' upgrade_bootmgr /var/emhome/admin/nkipflash-6.2-GA029a02.bin '''ipso 4.1(needs device parameter)''' to check/determine boot manager device number... ipsctl kern:bootmgr:bmdev where X = device number from above upgrade_bootmgr /dev/wdX /var/emhome/admin/nkipflash-6.2-GA029a02.bin example: upgrade_bootmgr /dev/wd1 /var/emhome/admin/nkipflash-6.2-GA029a02.bin [[category:nokia]] 67 66 2013-04-21T03:02:55Z Nighthawk 1 wikitext text/x-wiki determine boot manager device number ipsctl kern:bootmgr:bmdev where X = device number from above upgrade_bootmgr /dev/wdX /var/emhome/admin/nkipflash-6.2-GA029a02.bin [[category:nokia]] 66 2013-04-21T03:00:40Z Nighthawk 1 Created page with "asdf" wikitext text/x-wiki asdf nokia ipso double default gateway check 0 73 102 2013-05-18T05:46:19Z Nighthawk 1 Created page with "This command is useful after installing IPSO and restoring a config. Sometimes the default gateway set for the IPSO install will linger... firewall1[admin]# cat /config/acti..." wikitext text/x-wiki This command is useful after installing IPSO and restoring a config. Sometimes the default gateway set for the IPSO install will linger... firewall1[admin]# cat /config/active | grep "default:gateway:address" | grep " t" | wc -l [[category:ipso]] nokia ipso verify hotfixes installed 0 199 601 2016-07-24T01:51:53Z Nighthawk 1 Created page with "<source lang="bash"> # cpvinfo /opt/CPsuite-R75.20/fw1/boot/modules/fwmod.o | grep -i minor Minor Release = foxx_hf_ha30_390 </source>" wikitext text/x-wiki <source lang="bash"> # cpvinfo /opt/CPsuite-R75.20/fw1/boot/modules/fwmod.o | grep -i minor Minor Release = foxx_hf_ha30_390 </source> 2f3cf9001f5be7b226fdfa25e9b263d3c57ce303 nokia legacy vrrp failover 0 179 514 513 2014-07-12T18:27:52Z Nighthawk 1 wikitext text/x-wiki O.S. version: IPSO 4.2 If stuck working on and archaic firewall with a legacy vrrp setup, vrids must be failed over individually. The commands are below as shown by a one-liner script that will output the commands needed for you. # clish -c "show vrrp interfaces" | grep -E "Interface|VRID" | awk '{ if ($1=="Interface") printf "clish -c \"set vrrp interface %s ", $2; else printf "monitored-circuit vrid %s priority 105\"\n",$2;}' monitored-circuit vrid Interfaces priority 105" '''<<<ignore first line of output''' clish -c "set vrrp interface eth-s1/s1p1c0 monitored-circuit vrid 48 priority 105" clish -c "set vrrp interface eth-s1/s2p2c1 monitored-circuit vrid 153 priority 105" clish -c "set vrrp interface eth-s1/s2p2c10 monitored-circuit vrid 165 priority 105" clish -c "set vrrp interface eth-s1/s2p2c11 monitored-circuit vrid 164 priority 105" clish -c "set vrrp interface eth-s1/s2p2c12 monitored-circuit vrid 167 priority 105" [[category:nokia]] [[category:ipso]] [[category:vrrp]] 513 512 2014-07-12T18:27:43Z Nighthawk 1 wikitext text/x-wiki O.S. version: IPSO 4.2 If stuck working on and archaic firewall with a legacy vrrp setup, vrids must be failed over individually. The commands are below as shown by a one-liner script that will output the commands needed for you. # clish -c "show vrrp interfaces" | grep -E "Interface|VRID" | awk '{ if ($1=="Interface") printf "clish -c \"set vrrp interface %s ", $2; else printf "monitored-circuit vrid %s priority 105\"\n",$2;}' monitored-circuit vrid Interfaces priority 105" '''<<<ignore first line of output''' clish -c "set vrrp interface eth-s1/s1p1c0 monitored-circuit vrid 48 priority 105" clish -c "set vrrp interface eth-s1/s2p2c1 monitored-circuit vrid 153 priority 105" clish -c "set vrrp interface eth-s1/s2p2c10 monitored-circuit vrid 165 priority 105" clish -c "set vrrp interface eth-s1/s2p2c11 monitored-circuit vrid 164 priority 105" clish -c "set vrrp interface eth-s1/s2p2c12 monitored-circuit vrid 167 priority 105" [[category:nokia]] [[category:ipso]] [[category:vrrp]] 512 2014-07-12T18:27:17Z Nighthawk 1 Created page with "O.S. version: IPSO 4.2 If stuck working on and archaic firewall with a legacy vrrp setup, vrids must be failed over individually. The commands are below as shown by a one-l..." wikitext text/x-wiki O.S. version: IPSO 4.2 If stuck working on and archaic firewall with a legacy vrrp setup, vrids must be failed over individually. The commands are below as shown by a one-liner script that will output the commands needed for you. # clish -c "show vrrp interfaces" | grep -E "Interface|VRID" | awk '{ if ($1=="Interface") printf "clish -c \"set vrrp interface %s ", $2; else printf "monitored-circuit vrid %s priority 105\"\n",$2;}' monitored-circuit vrid Interfaces priority 105" '''<<<ignore first line of output''' clish -c "set vrrp interface eth-s1/s1p1c0 monitored-circuit vrid 48 priority 105" clish -c "set vrrp interface eth-s1/s2p2c1 monitored-circuit vrid 153 priority 105" clish -c "set vrrp interface eth-s1/s2p2c10 monitored-circuit vrid 165 priority 105" clish -c "set vrrp interface eth-s1/s2p2c11 monitored-circuit vrid 164 priority 105" clish -c "set vrrp interface eth-s1/s2p2c12 monitored-circuit vrid 167 priority 105" [[category:nokia]] [[category:ipso]] [[category:vrrp]] opengear console notes 0 265 890 889 2023-12-15T15:18:24Z Nighthawk 1 wikitext text/x-wiki to enter portmanager shell, run ''pmshell'' example: $ pmshell 1: Router 4: PDU 6: ISR 8: Switch 33: Front, Upper 34: Front, Lower <br>Connect to port > to connect to a port, just type the number followed by <enter> escape character: * By default, the escape character is: ~ * If you are connected using the OpenSSH command line client, e.g. from Mac or Linux system, you must type a second ~ to trigger the escape, i.e.: ~~ * An alternate escape character may be set under Serial & Network -> Serial Port -> Edit/Edit Multiple Ports -> Escape Character * The escape character must be the first character on a new line Shell Commands: ~b - Generate BREAK ~h - View history ~p - Power menu ~c - Port Configuration menu ~u – User sessions disconnect menu ~m - Connect to port menu ~. - Exit pmshell ~? - Show this message a34a4641332731eb8ea0385034f0bc6dd07772a1 889 2023-12-15T15:17:54Z Nighthawk 1 Created page with "to enter portmanager shell, run ''pmshell'' example: $ pmshell 1: Router 4: PDU 6: ISR 8: Switch 33: Front, Upper 34: Front, Lowe..." wikitext text/x-wiki to enter portmanager shell, run ''pmshell'' example: $ pmshell 1: Router 4: PDU 6: ISR 8: Switch 33: Front, Upper 34: Front, Lower <br>Connect to port > escape character: * By default, the escape character is: ~ * If you are connected using the OpenSSH command line client, e.g. from Mac or Linux system, you must type a second ~ to trigger the escape, i.e.: ~~ * An alternate escape character may be set under Serial & Network -> Serial Port -> Edit/Edit Multiple Ports -> Escape Character * The escape character must be the first character on a new line Shell Commands: ~b - Generate BREAK ~h - View history ~p - Power menu ~c - Port Configuration menu ~u – User sessions disconnect menu ~m - Connect to port menu ~. - Exit pmshell ~? - Show this message 4256eb0f1e5e80aba27dd09d7cedfeafed2b6ec2 palo alto api 0 252 837 2019-09-16T22:44:17Z Nighthawk 1 Created page with " [https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-panorama-api/get-started-with-the-pan-os-xml-api/explore-the-api.html PAN-OS® and Panorama™ API Guide] ==panxapi== co..." wikitext text/x-wiki [https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-panorama-api/get-started-with-the-pan-os-xml-api/explore-the-api.html PAN-OS® and Panorama™ API Guide] ==panxapi== command line program for accessing the PAN-OS XML API [https://github.com/kevinsteves/pan-python/blob/master/doc/panxapi.rst panxapi.py documentation] [[category:palo alto]] [[category:api]] affa1214ad5202d226d6d89817b1101f2f1e0e84 palo alto panorama 0 41 46 2013-04-09T14:52:14Z Nighthawk 1 Created page with "quick start guide https://sites.google.com/site/panfirewall/panorama \ [[category:pan]]" wikitext text/x-wiki quick start guide https://sites.google.com/site/panfirewall/panorama \ [[category:pan]] panorama api 0 251 836 835 2019-08-23T17:31:58Z Nighthawk 1 wikitext text/x-wiki login for token / key $ curl -k "https://<''hostname|ip''>/api/?type=keygen&user=<username>&password=<password>" example... curl -k "https://192.168.1.1/api/?type=keygen&user=admin&password=admin" <response status = 'success'><result><key>LUFRPT1jMUFXZHlNdDBPVTEya0lQNWorTyttYURFNmM9UHdvL2REWWUyaWFIU1hlZHdiRU5BQT09</key></result></response> Get a list of firewalls that Panorama manages: https://<''hostname|ip''>/api/?type=op&cmd=<show><devices><all></all></devices></show> curl example curl -kg "https://192.168.1.1/api/?type=op&cmd=<show><devices><all></all></devices></show>&key=LUFRPT1jMUFXZHlNdDBPVTEya0lQNWorTyttYURFNmM9UHdvL2REWWUyaWFIU1hlZHdiRU5BQT09" 94859ccb38cd9df1dbd1e9b59a5934fa44310468 835 2019-08-23T17:23:12Z Nighthawk 1 Created page with " login for token / key $ curl -k "https://<hostname|ip>/api/?type=keygen&user=<username>&password=<password>" Get a list of firewalls that Panorama manages: https://p..." wikitext text/x-wiki login for token / key $ curl -k "https://<hostname|ip>/api/?type=keygen&user=<username>&password=<password>" Get a list of firewalls that Panorama manages: https://panorama/api/?type=op&cmd=<show><devices><all></all></devices></show> 6b827bbcb07c88d16b7bcd6771af4e362068355a policy installation status via CLI 0 112 679 678 2017-08-21T20:47:56Z Nighthawk 1 wikitext text/x-wiki These commands can be used to query policy info for firewalls. The cpmistat command is executed on Security Management Server / Domain Security Management Server. The firewall name should be a standalone firewall or a cluster member. It won't work for cluster objects. Many other parameters are available via cpmistat. get name of policy installed on a firewalls # cpmistat -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat.fwPolicyName get install time # cpmistat -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat.fwInstallTime [[category:cpmistat]] 406a8f10dfcfadc2eccbd292bd29e4062212a1ca 678 204 2017-08-16T15:59:19Z Nighthawk 1 wikitext text/x-wiki These commands can be used to query policy info for firewalls. The cpmistat command is executed on Security Management Server / Domain Security Management Server. The firewall name should be a standalone firewall or a cluster member. It won't work for cluster objects. Many other parameters are available via cpmistat. get name of policy installed on a firewalls # cpmistat -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat.fwPolicyName get install time # cpmistat -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat. [[category:cpmistat]] ac76fd1a3fb419b7b3660eddbca313f9e27cde7d 204 2013-08-20T20:56:41Z Nighthawk 1 Created page with "get name of policy installed on a firewalls cpmistat -o snmp -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat.fwPolicyName [[category:cpmistat]]" wikitext text/x-wiki get name of policy installed on a firewalls cpmistat -o snmp -r fw ''firewall_name'' | grep fwStatus.fwPolicyStat.fwPolicyName [[category:cpmistat]] project - chkp to PAN migration 0 60 80 79 2013-04-26T17:43:36Z Nighthawk 1 wikitext text/x-wiki Check Point to Palo Alto Firewall rules and objects migration procedure == problems == splitting management and passthrough firewall rules dealing with trust / untrust zones (zone to zone mapping) check point firewall object IP netmask issue PolicyName.W bug nat rule import error... [[file:pan_load_migrated_config_nat_rule_errors.png]] == nice to haves == pull ntp config [[category:PAN]] 79 2013-04-26T17:42:51Z Nighthawk 1 Pushed from Themanclub. wikitext text/x-wiki == problems == splitting management and passthrough firewall rules dealing with trust / untrust zones (zone to zone mapping) check point firewall object IP netmask issue PolicyName.W bug nat rule import error... [[file:pan_load_migrated_config_nat_rule_errors.png]] == nice to haves == pull ntp config [[category:PAN]] project - log settings identify 0 124 298 297 2013-11-01T16:57:27Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep self_log_server | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''multiple results possible''' cpmiquerybin object "" network_objects "name='$firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' | tr '\n' ' ' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | sed -n -e '/backup_log_servers/,/:send_alerts_to/ p'| grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' | tr '\n' ' ' 297 296 2013-10-31T17:25:16Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep self_log_server | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''multiple results possible''' cpmiquerybin object "" network_objects "name='$firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' | tr '\n' ' ' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | sed -n -e '/backup_log_servers/,/:send_alerts_to/ p'| grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' | tr '\n' ' ' backup_log_servers 296 295 2013-10-31T17:22:49Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep self_log_server | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''multiple results possible''' cpmiquerybin object "" network_objects "name='$firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' | tr '\n' ' ' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | sed -n -e '/backup_log_servers/,/:send_alerts_to/ p' | grep -E ":Name |self_log_server (true)" backup_log_servers 295 294 2013-10-31T17:13:21Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep self_log_server | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''multiple results possible''' cpmiquerybin object "" network_objects "name='$FIREWALL_NAME'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" backup_log_servers 294 293 2013-10-31T17:10:58Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep self_log_server | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' '''multiple results possible''' cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" backup_log_servers 293 292 2013-10-31T16:37:09Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' 292 291 2013-10-31T16:19:45Z Nighthawk 1 wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep log_switch_before_forwarding | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' 291 290 2013-10-31T16:08:25Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' 290 289 2013-10-31T16:08:11Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' 289 288 2013-10-31T16:07:56Z Nighthawk 1 wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$ cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep -A 1 log_forward_target | grep ":Name" | sed -n 's/.*(\([^ ]*\))/\1/p' 288 273 2013-10-31T16:03:27Z Nighthawk 1 /* scratch */ wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls <p> cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)"</p> <p> cpmiquerybin object "" network_objects "name='kdallabfw1'" | grep forward_logs | sed -n 's/.*(\([^ ]*\))/\1/p' | grep -v ^$</p> 273 2013-09-23T21:39:02Z Nighthawk 1 Created page with " == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybi..." wikitext text/x-wiki == Problem: == indentify firewalls configured to log to CMA, or locally... anything except for CLM only. == script name: == ??? == scratch == mdsenv <ip> cpmiquerybin attr "" network_objects "firewall='installed'" -a __name__ ###indentify all firewalls cpmiquerybin object "" network_objects "name='firewall_name'" | sed -n -e '/:send_logs_to/,/:self_log_server/ p' | grep -E ":Name |self_log_server (true)" queryDB util 0 110 283 200 2013-10-24T01:14:33Z Nighthawk 1 wikitext text/x-wiki == get group object members == network objects printf "localhost\n-t network_objects -o ''obj_grp'' -pf\n-q\n" | queryDB_util services printf "localhost\n-t services -o ''icmp-requests'' -pf\n-q\n" | queryDB_util [[category:CPMI]] 200 2013-07-29T20:26:21Z Nighthawk 1 Created page with " == get group object members == network objects printf "localhost\n-t network_objects -o obj_grp -pf\n-q\n" | queryDB_util | grep ": Name:" | sed -e 's/(Table: network_ob..." wikitext text/x-wiki == get group object members == network objects printf "localhost\n-t network_objects -o obj_grp -pf\n-q\n" | queryDB_util | grep ": Name:" | sed -e 's/(Table: network_objects) //g' | sed -e 's/Name: //g' | sed -e 's/ : //' services printf "localhost\n-t services -o icmp-requests -pf\n-q\n" | queryDB_util | grep ": Name:" | sed -e 's/(Table: services) //g' | sed -e 's/Name: //g' | sed -e 's/ ://' [[category:CPMI]] query rule hit counter db via command line 0 205 742 741 2018-04-13T18:35:52Z Nighthawk 1 /* example queries R80+ */ wikitext text/x-wiki ==example queries R80+== the database was moved from the sqlite file to postgres *** note **** case matters for the UID! all characters must be upper case it seems... show all hit count data for a specific rule uid # '''psql_client monitoring postgres -c "select hits,end_date from hitcount where rule_uid = '{0C8C26F9-7A52-4160-BB96-73AECEF13758}' limit 5"''' hits | end_date ------+--------------------- 4 | 2017-06-30 22:01:08 16 | 2017-07-01 22:01:06 16 | 2017-07-02 22:01:05 16 | 2017-07-03 22:01:03 16 | 2017-07-04 22:01:02 show # '''mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | {rule_number: ."rule-number",uid: .uid,hits: .hits.value}'''' "rule_number": 1, "uid": "1de8fab0-4858-4067-977d-1cbb5cd2e55d", "hits": 0 <br> "rule_number": 2, "uid": "bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07", "hits": 19 <br> "rule_number": 3, "uid": "bc69f34d-7ee8-47fe-a225-11b8e27e9a44", "hits": 16617 <br> "rule_number": 4, "uid": "26373728-50df-49c3-b8d0-8895e350bc9f", "hits": 1187628 ==example queries R75.30== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount f1dac8e63af5c3455fa89ed28d1e76016bc60ea9 741 732 2018-04-13T18:35:40Z Nighthawk 1 /* example queries R80+ */ wikitext text/x-wiki ==example queries R80+== the database was moved from the sqlite file to postgres *** note **** case matters for the UID! all characters must be upper case it seems... show all hit count data for a specific rule uid # '''psql_client monitoring postgres -c "select hits,end_date from hitcount where rule_uid = '{0C8C26F9-7A52-4160-BB96-73AECEF13758}' limit 5"''' hits | end_date ------+--------------------- 4 | 2017-06-30 22:01:08 16 | 2017-07-01 22:01:06 16 | 2017-07-02 22:01:05 16 | 2017-07-03 22:01:03 16 | 2017-07-04 22:01:02 show # '''mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | {rule_number: ."rule-number",uid: .uid,hits: .hits.value}'''' "rule_number": 1, "uid": "1de8fab0-4858-4067-977d-1cbb5cd2e55d", "hits": 0 <br> "rule_number": 2, "uid": "bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07", "hits": 19 <br> "rule_number": 3, "uid": "bc69f34d-7ee8-47fe-a225-11b8e27e9a44", "hits": 16617 <br> "rule_number": 4, "uid": "26373728-50df-49c3-b8d0-8895e350bc9f", "hits": 1187628 ==example queries R75.30== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount 514f13a26f60192e01f7960c58ff1238280125bd 732 731 2018-03-27T14:14:53Z Nighthawk 1 wikitext text/x-wiki ==example queries R80+== the database was moved from the sqlite file to postgres show all hit count data for a specific rule uid # '''psql_client monitoring postgres -c "select hits,end_date from hitcount where rule_uid = '{0C8C26F9-7A52-4160-BB96-73AECEF13758}' limit 5"''' hits | end_date ------+--------------------- 4 | 2017-06-30 22:01:08 16 | 2017-07-01 22:01:06 16 | 2017-07-02 22:01:05 16 | 2017-07-03 22:01:03 16 | 2017-07-04 22:01:02 show # '''mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | {rule_number: ."rule-number",uid: .uid,hits: .hits.value}'''' "rule_number": 1, "uid": "1de8fab0-4858-4067-977d-1cbb5cd2e55d", "hits": 0 <br> "rule_number": 2, "uid": "bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07", "hits": 19 <br> "rule_number": 3, "uid": "bc69f34d-7ee8-47fe-a225-11b8e27e9a44", "hits": 16617 <br> "rule_number": 4, "uid": "26373728-50df-49c3-b8d0-8895e350bc9f", "hits": 1187628 ==example queries R75.30== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount 199b33c30bc02a45e1878ff541cd96d6aca935bd 731 730 2018-03-27T14:14:24Z Nighthawk 1 /* example queries R80+ */ wikitext text/x-wiki ==example queries R80+== the database was moved from the sqlite file to postgres show all hit count data for a specific rule uid # psql_client monitoring postgres -c "select hits,end_date from hitcount where rule_uid = '{0C8C26F9-7A52-4160-BB96-73AECEF13758}' limit 5" hits | end_date ------+--------------------- 4 | 2017-06-30 22:01:08 16 | 2017-07-01 22:01:06 16 | 2017-07-02 22:01:05 16 | 2017-07-03 22:01:03 16 | 2017-07-04 22:01:02 show # mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | {rule_number: ."rule-number",uid: .uid,hits: .hits.value}' "rule_number": 1, "uid": "1de8fab0-4858-4067-977d-1cbb5cd2e55d", "hits": 0 <br> "rule_number": 2, "uid": "bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07", "hits": 19 <br> "rule_number": 3, "uid": "bc69f34d-7ee8-47fe-a225-11b8e27e9a44", "hits": 16617 <br> "rule_number": 4, "uid": "26373728-50df-49c3-b8d0-8895e350bc9f", "hits": 1187628 ==example queries R75.30== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount cbc54cf66ddc909ce844db3f7de4a85eace50968 730 687 2018-03-27T14:05:40Z Nighthawk 1 wikitext text/x-wiki ==example queries R80+== the database was moved from the sqlite file to postgres # psql_client monitoring postgres -c "select * from hitcount where rule_uid = '' limit 5" # mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | {rule_number: ."rule-number",uid: .uid,hits: .hits.value}' "rule_number": 1, "uid": "1de8fab0-4858-4067-977d-1cbb5cd2e55d", "hits": 0 <br> "rule_number": 2, "uid": "bbbfd8e6-72b6-4ff0-82ca-a9b0a6151d07", "hits": 19 <br> "rule_number": 3, "uid": "bc69f34d-7ee8-47fe-a225-11b8e27e9a44", "hits": 16617 <br> "rule_number": 4, "uid": "26373728-50df-49c3-b8d0-8895e350bc9f", "hits": 1187628 ==example queries R75.30== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount c48624918e22b8e8cfc89b4b74e06b955facbeef 687 686 2017-09-14T16:21:05Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' hits per day for a firewall, within day range sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select date(start_date, "unixepoch") as day, SUM(hits) AS hits_total from HitCountRules where netobj_name="<my_firewall>" AND day between "2017-07-25" and "2017-09-14" GROUP by day' keywords: hit count, hitcount aa9dfcfd33ce9bbd11123722ed820fb152fe3b36 686 685 2017-09-14T15:52:15Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' keywords: hit count, hitcount c71295123d3a0b1fc58d906fb0128c8a6497bb94 685 684 2017-09-14T15:52:08Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall"' keywords: hit count, hitcount 10843df011bc49a30d0f1a24691cc35cb40180a2 684 683 2017-09-14T04:00:48Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' keywords: hit count, hitcount d307e186d685dda386737d4bf657d11535553260 683 682 2017-08-23T16:31:14Z Nighthawk 1 Nighthawk moved page [[hit counter]] to [[query rule hit counter db via command line]] without leaving a redirect wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' keywords: hit count, hitcount 14487da66d33f9758d6bbb39f48ad76c35821d95 682 628 2017-08-23T16:30:32Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' keywords: hit count, hitcount 14487da66d33f9758d6bbb39f48ad76c35821d95 628 627 2017-04-16T22:12:19Z Nighthawk 1 /* example query */ wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="myfirewall" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' fde9153c8169b447ae05f885fc850ac52f341f67 627 620 2017-04-16T22:11:51Z Nighthawk 1 wikitext text/x-wiki ==example query== sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' 4ff98b330ab3084cd20f02b64b332311bbf6d7cf 620 619 2017-04-16T21:49:49Z Nighthawk 1 wikitext text/x-wiki sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' <syntaxhighlight lang="sql" class=wrap> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </pre> </syntaxhighlight> 49da9d8aecb788ccb8b6f7ad52fba9f89eaaf313 619 618 2017-04-16T21:45:08Z Nighthawk 1 wikitext text/x-wiki <pre> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </pre> <syntaxhighlight lang="sql" class=wrap> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </pre> </syntaxhighlight> 148ed3b1189fdb27441facd08934e2061974c86f 618 617 2017-04-16T21:42:21Z Nighthawk 1 wikitext text/x-wiki <pre> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </pre> <syntaxhighlight lang="bash" class=wrap> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </pre> </syntaxhighlight> 2f7aac5263a515c30b4f735901941c903190ac33 617 616 2017-04-16T21:38:29Z Nighthawk 1 wikitext text/x-wiki <pre> <source lang="bash" inline> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </source> </pre> 708cf8050e26b975746e50aea2672043b467632e 616 2017-04-16T21:30:44Z Nighthawk 1 Created page with " <syntaxhighlight lang="bash"> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, net..." wikitext text/x-wiki <syntaxhighlight lang="bash"> sqlite3 $FWDIR/conf/hit_count_rules_table.sqlite 'select datetime(start_date, "unixepoch") as time, datetime(end_date, "unixepoch") as time, netobj_name, rule_uid, hits from HitCountRules where netobj_name="PBROxxRCHVCP1" and rule_uid="{609C7EC8-82CA-4A58-BEB8-226626DBD3E3}"' </syntaxhighlight> ec724810dcc6dc27f2a35f122ad3c76dff4d8d0a r80.10 what is new 0 231 777 776 2018-05-03T02:30:44Z Nighthawk 1 /* objects window */ wikitext text/x-wiki ==Unified Console== ===legacy apps gone?=== nope... [[file:unified_and_legacy_consoles.png]] ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ===diffs=== objects window moved to the right side policy install status lower left ===Publishing Changes=== ===unpublished changes=== In earlier version of the SmartDashboard, if the client crashed or was disconnected then the changes were lost. This is not the case with r80+. Changes are saved on the Management server automatically. They do not take effect until published. ==troubleshooting== error message [[file:object_locked.png]] this is often due to an unpublished session. The unpublished session can be found under Manage & Settings > Sessions > View Sessions Look for session with locks and changes. If the Connection Mode show "Disconnected", then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. [[file:session_disconnected.png]] 9aaa3a307e4ffa9d01357a0a349df5c0aacbfea6 776 774 2018-05-01T19:55:58Z Nighthawk 1 /* tabbed policies */ wikitext text/x-wiki ==Unified Console== ===legacy apps gone?=== nope... [[file:unified_and_legacy_consoles.png]] ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ===objects window=== moved to the right side ===Publishing Changes=== ===unpublished changes=== In earlier version of the SmartDashboard, if the client crashed or was disconnected then the changes were lost. This is not the case with r80+. Changes are saved on the Management server automatically. They do not take effect until published. ==troubleshooting== error message [[file:object_locked.png]] this is often due to an unpublished session. The unpublished session can be found under Manage & Settings > Sessions > View Sessions Look for session with locks and changes. If the Connection Mode show "Disconnected", then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. [[file:session_disconnected.png]] 0f793f5d1a5c570ccb93318028ebdfd94a094fef 774 773 2018-05-01T19:46:15Z Nighthawk 1 /* Unified Console */ wikitext text/x-wiki ==Unified Console== ===legacy apps gone?=== nope... [[file:unified_and_legacy_consoles.png]] ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ===Publishing Changes=== ===unpublished changes=== In earlier version of the SmartDashboard, if the client crashed or was disconnected then the changes were lost. This is not the case with r80+. Changes are saved on the Management server automatically. They do not take effect until published. ==troubleshooting== error message [[file:object_locked.png]] this is often due to an unpublished session. The unpublished session can be found under Manage & Settings > Sessions > View Sessions Look for session with locks and changes. If the Connection Mode show "Disconnected", then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. [[file:session_disconnected.png]] cba0b51ee893bb5710e86dd528e1fe94f12e564d 773 771 2018-04-25T14:41:14Z Nighthawk 1 /* Publishing Changes */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ===Publishing Changes=== ===unpublished changes=== In earlier version of the SmartDashboard, if the client crashed or was disconnected then the changes were lost. This is not the case with r80+. Changes are saved on the Management server automatically. They do not take effect until published. ==troubleshooting== error message [[file:object_locked.png]] this is often due to an unpublished session. The unpublished session can be found under Manage & Settings > Sessions > View Sessions Look for session with locks and changes. If the Connection Mode show "Disconnected", then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. [[file:session_disconnected.png]] 26bfaf712430e31057eee485c0359eb1a7c0714c 771 769 2018-04-24T21:39:45Z Nighthawk 1 /* troubleshooting */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ==Publishing Changes== ===unpublished changes=== ==troubleshooting== error message [[file:object_locked.png]] this is often due to an unpublished session. The unpublished session can be found under Manage & Settings > Sessions > View Sessions Look for session with locks and changes. If the Connection Mode show "Disconnected", then it is likely the source of the issue. An administrator can Publish, Discard or Take Over the session with the SmartConsole. [[file:session_disconnected.png]] fc24512a3f1fb3f5223603fc884094c811a2d978 769 767 2018-04-24T21:35:22Z Nighthawk 1 /* troubleshooting */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ==Publishing Changes== ===unpublished changes=== ==troubleshooting== [[file:session_disconnected.png]] c5fab01a83f1bd20d352fd3bcd16c4c987311377 767 766 2018-04-24T21:31:14Z Nighthawk 1 /* unpublished changes */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ==Publishing Changes== ===unpublished changes=== ==troubleshooting== [[file:session_disconnected.png]] 96e3009835dfe017757324300f5ae0b02d903e31 766 765 2018-04-24T21:30:44Z Nighthawk 1 /* Policy Layers and Sub-Policies */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Security Policies View== ===tabbed policies=== ==Publishing Changes== ===unpublished changes=== 8b392c2cc160ed83d2a1aacd09bf7c291fcc5590 765 764 2018-04-24T18:57:38Z Nighthawk 1 wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== ==Publishing Changes== ===unpublished changes=== c9d954c831b7fe25b756298da8bd9eda8316e822 764 761 2018-04-24T17:24:02Z Nighthawk 1 /* Gateway & Server View */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) sort by Domain 4) right click the Domain Management object(CMA) in the same domain as the firewall and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== 6307242350a4765ee2d3ed88de8f9723f1716aba 761 760 2018-04-24T17:14:09Z Nighthawk 1 /* Global Policy Assingment */ wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Gateway & Server View=== To use the MutliDomain view to launch a SmartConsole to the Domain(CMA) for a particular firewall of interest, 1) navigate to Gateways & Server View 2) find the firewall of interest 3) set Columns: to Management 4) sort by Domain 5) right click the Domain/CMA/Management object of interest and select View [[file:gateway_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== 6b6d6c2945ebd28423b030c2f68cab5675e5dbac 760 758 2018-04-24T16:12:29Z Nighthawk 1 wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] search is broken ===Global Policy Assingment=== [[file:global_assing.png]] ==Policy Layers and Sub-Policies== 73dd2ad3131f7d1c1c59c85344300d81d30ffe23 758 754 2018-04-24T15:31:02Z Nighthawk 1 wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== [[file:mds_login.png]] ===MultiDomain View=== [[file:multidomain_view.png]] ===Global Policy Assingment=== [[file:global_assing.png]] 7ef317b3550e3ee781cda4f3a7b8341950d73b87 754 2018-04-24T15:27:54Z Nighthawk 1 Created page with "==Unified Console== ===Multi-Domain login=== ===MultiDomain View=== ===Global Policy===" wikitext text/x-wiki ==Unified Console== ===Multi-Domain login=== ===MultiDomain View=== ===Global Policy=== 710e328d9c5fbf79a26883d89607d7c7a90c3b09 r80 api notes 0 220 911 910 2024-06-09T07:05:30Z Nighthawk 1 wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ===access rules=== ====notes before you begin==== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====show access layers?==== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ====examples==== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ====adding rules==== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ===log queries=== mgmt_cli -s id.txt show-logs new-query.filter "src:10.0.0.11 and service:https" new-query.time-frame last-hour new-query.max-logs-per-request 1 --format json | jq '.logs[] | {time: .time,fw: .orig,log_server: .orig_log_server,policy: .policy_name,action: .action,source: .src,dest: .dst,service: .service}' { "time": "2023-06-09T06:20:20Z", "fw": "my_cp_fw1", "log_server": "192.168.1.88", "policy": "super_secure", "action": "Accept", "source": "10.0.0.11", "dest": "204.79.197.203", "service": "443" } ==jq== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... '''| jq '.objects[] | {name: .name,type: .type}'''' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references '''| jq '.objects[] | [.name, .type]'''' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated '''| jq '.objects[] | [.name, .type] | join (",")''' "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" ==curl== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] d64b1dbb90e18251831989db4d5862075b3826df 910 906 2024-06-09T07:04:51Z Nighthawk 1 wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ===access rules=== ====notes before you begin==== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====show access layers?==== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ====examples==== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ====adding rules==== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ===log queries=== mgmt_cli -s id.txt show-logs new-query.filter "src:10.0.0.11 and service:https" new-query.time-frame last-hour new-query.max-logs-per-request 1 --format json | jq '.logs[] | {time: .time,fw: .orig,log_server: .orig_log_server,policy: .policy_name,action: .action,source: .src,dest: .dst,service: .service}' { "time": "2023-06-09T06:20:20Z", "fw": "my_cp_fw1", "log_server": "192.168.1.88", "policy": "super_secure", "action": "Accept", "source": "10.0.0.11", "dest": "204.79.197.203", "service": "443" } ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... '''| jq '.objects[] | {name: .name,type: .type}'''' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references '''| jq '.objects[] | [.name, .type]'''' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated '''| jq '.objects[] | [.name, .type] | join (",")''' "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 5db64e28ce6f75854136c60a100fa0cba6be0d8f 906 905 2024-05-02T04:18:22Z Nighthawk 1 /* jq */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... '''| jq '.objects[] | {name: .name,type: .type}'''' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references '''| jq '.objects[] | [.name, .type]'''' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated '''| jq '.objects[] | [.name, .type] | join (",")''' "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 5cc77d8505569683083ed0bb95aecf0d0ba4923c 905 904 2024-05-02T04:18:00Z Nighthawk 1 /* jq */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... '''| jq '.objects[] | {name: .name,type: .type}'''' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references '''| jq '.objects[] | [.name, .type]'''' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated '''| jq '.objects[] | [.name, .type] | join (",")''' "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 4872d7edf27012909d51494b6e13331d4c092d6b 904 903 2024-05-02T04:17:39Z Nighthawk 1 /* jq */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... '''| jq '.objects[] | {name: .name,type: .type}'''' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references | jq '.objects[] | [.name, .type]' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated | jq '.objects[] | [.name, .type] | join (",") "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 4c406a188c14466968ab4249a8a8aac4d9c13b9a 903 902 2024-05-02T04:17:11Z Nighthawk 1 /* jq */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... | jq '.objects[] | {name: .name,type: .type}' { "name": chkp-fw", "type": "simple-gateway" } { "name": "chkp-mgmt", "type": "checkpoint-host" } without keys, change from curly {} to square [] brackets and drop key references | jq '.objects[] | [.name, .type]' [ "chkp-fw", "simple-gateway" ] [ "chkp-mgmt", "checkpoint-host" ] print all values on the same line, comma separated | jq '.objects[] | [.name, .type] | join (",") "chkp-fw simple-gateway" "chkp-mgmt,checkpoint-host" "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] b21a2c48f55abd7b090986b706a18ab4877fe4e5 902 901 2024-05-02T04:07:15Z Nighthawk 1 /* jq */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' get values without keys example with keys... | jq '.objects[] | {name: .name,type: .type}' without keys, change from curly {} to square [] brackets and drop key references | jq '.objects[] | [.name, .type]' print all values on the same line, comma separated | jq '.objects[] | [.name, .type] | join (",") "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 826be377c56cd2a042f9a2a2e36edb2e67ff0d6d 901 900 2024-04-01T19:25:28Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://192.168.1.10:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 53e70b176ef40e7cafb8b6fad7103df079db2e2d 900 899 2024-03-19T16:24:06Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] b075a30ba753b3419866831f8d4d6e3123b41b35 899 898 2024-03-19T16:23:09Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" $ '''curl --insecure -X POST -H "Content-Type: application/json" -H "X-chkp-sid: $SESSIONID" -d '{ }' https://192.168.1.10:443/web_api/keepalive''' { "message" : "OK" } ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 0aec84146ee509d45c9bb7fd441abb150481f6e3 898 897 2024-03-19T16:15:28Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" lol ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] c5d95d3e5ba2d9ee3fc8c6981da4dcb2ca5e6f29 897 896 2024-03-19T16:14:52Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $ '''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] f787933985d9e09912f777be7a6ef2d6491d2c52 896 895 2024-03-19T16:14:44Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $'''curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login''' { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] d9934e100e3198a99c51f29b55e2d68b5a1979fe 895 894 2024-03-19T16:14:22Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login $== curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login == { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 740e1abeedb696295fc62d41a0f0862022570bdd 894 893 2024-03-19T16:13:45Z Nighthawk 1 /* curl */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' curl -X -H POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' 192.168.1.10:443/login curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 87a375ea999954c7e9841597437cf59fada0074a 893 892 2024-02-16T16:38:52Z Nighthawk 1 /* jq examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==examples== ===jq=== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ===curl=== curl -X POST -H "Content-Type: application/json" \ -d '{"userId": 5, "title": "Post Title", "body": "Post content."}' \ https://jsonplaceholder.typicode.com/posts curl -X -H POST -H "Content-Type: application/json" \ -d '{"user" : "jsmith", "password" : "abc123"}' \ 192.168.1.10:443/login curl --insecure -X POST -H "Content-Type: application/json" -d '{"user" : "jsmith", "password" : "abc123"}' https://192.168.1.10:443/web_api/login { "uid" : "46a11170-e554-4e58-a5fc-65ff9e38d8cb", "sid" : "dfq6sI1MxMT1qUhXQ7tafQduKAfJxYkqXCEjaQKjres", "url" : "https://10.128.1.81:443/web_api", "session-timeout" : 600, "last-login-was-at" : { "posix" : 1707413218074, "iso-8601" : "2024-02-08T10:26-0700" }, "api-server-version" : "1.8.1", "user-name" : "jsmith", "user-uid" : "c1109c35-d741-7jg8-98e3-36669b7047a2" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 55be6529e3f9ab171e77a8dd40de0c0cbce94d02 892 848 2024-02-16T16:22:45Z Nighthawk 1 wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] [https://devqa.io/curl-sending-api-requests/ How to Use CURL to Send API Requests] 36d989bd0a3629ba61fc76c64f789594d10ed726 848 830 2020-11-06T19:19:59Z Nighthawk 1 /* adding rules */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ===mds / domain=== get list of domains,objects(management and firewalls),object type mgmt_cli.exe -s id.txt show gateways-and-servers --format json limit 500 | jq '.objects.nat,.name,.type' | xargs -n3 ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] 3cae6aa2b48490ac18cf62383a4899a382eb497b 830 827 2019-05-26T04:53:25Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ===adding rules=== mgmt_cli -s id.txt add access-rule layer xxad70c9-b4c6-4e64-9bfd-d57ac91289f3 name new_rule mgmt_cli -s id.txt add access-rule layer xx70adc9-b4c6-4e64-9bfd-d57ac91289f3 position top name new_rule mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" action "Accept" service add "https" mgmt_cli -s id.txt set access-rule name "new_rule" layer "xx70adc9-b4c6-4e64-9bfd-d57ac91289f3" service.add "https" ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] d126fd720481cc97b3e96c165dec718a208a6359 827 826 2019-04-25T23:45:11Z Nighthawk 1 /* links */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.4%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] a90f9d89fab9cf01e899437e5c20fcd1542bfd1b 826 822 2019-04-25T23:44:32Z Nighthawk 1 /* links */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://community.checkpoint.com/t5/General-Management-Topics/What-s-new-with-R80-20M1-Management-API/td-p/39522 What's new with R80.20M1 Management API] [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli] 9fbb9a6a8ef5fa5630566c52bf3a77126c4c1eef 822 821 2018-08-12T16:45:47Z Nighthawk 1 /* jq examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' get cluster member policy installation targets | jq -c '."installation-targets-revision"[] | ."cluster-members-revision"[] | ."target-name"' | tr -d '"' | tr '\n' ' ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 313040d1b6f28bee897404cb9252b5098cb522f2 821 820 2018-08-03T15:44:01Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' ==jq examples== compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' filter objects dictary for uid for accept action jq '."objects-dictionary"[] | select (.name == "Accept") | .uid' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' f961290e4ee7239d6101968596220dfcaa3b22cd 820 819 2018-08-03T15:27:03Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("hahah") or contains("lol") | not )) and (.enabled == true)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 04fcb487cce851beda19d7ba20bdd4473e773caf 819 818 2018-08-03T15:26:27Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' compound jq select using and/or (note: contains returns true/false) | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' and another one... | jq '.rulebase[] | .rulebase[] | select ((.comments | (contains("Skybox") or contains("skybox") | not )) and (.enabled == false)) | {enabled: .enabled, rulenum: ."rule-number", ruleUID: .uid, comments: .comments} ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 4ed421a8cf8dccea786ca4f994529d6f62a6086d 818 817 2018-08-03T15:00:17Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' compound jq select using and/or | jq '.rulebase[] | .rulebase[] | select (.comments | (contains("hahaha") or contains("lol")) | not ) | {ruleUID: .uid, comments: .comments} ' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' b762effb0a3ee012b9aa3828ac8c1b8d44d13a60 817 791 2018-08-03T10:47:31Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json limit 1 | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 22293cea8ea17f326a39343e3fa1bbd1725e08e8 791 790 2018-06-11T15:56:09Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 5ad87f00f6040afa8be08ed804534f7a725a2111 790 788 2018-06-11T15:48:54Z Nighthawk 1 /* logging in */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt same but read only # mgmt_cli login user admin read-only true > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 1777e2d98a1225e1eba68ffa207c8dd087eb210b 788 787 2018-05-17T20:54:25Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 3d19563f9b845bfeeabd99839719ceb6d9d6f71f 787 786 2018-05-17T20:54:07Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 3fb71ca18d9d642ddc45dc468acef5ef37d3bd6c 786 753 2018-05-17T20:53:50Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' eba9f4cf63f14cf51e47766d5fe10a26241fdd6a 753 752 2018-04-22T22:02:26Z Nighthawk 1 /* status check */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' edb3db25e9aa4d9552e5869983dcee6371cd06a3 752 751 2018-04-22T22:02:12Z Nighthawk 1 /* status check */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br> <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br> <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 72d965072808116a0c361783ed0572e9de1b3786 751 750 2018-04-22T22:01:48Z Nighthawk 1 /* status check */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' <br>API Settings: <br><nowiki>-----------------</nowiki> <br>Accessibility: Require all granted <br>Automatic Start: Enabled <br>Processes: <br> <br>Name State PID More Information <br><nowiki>-------------------------------------------------</nowiki> <br>API Started 10763 <br>CPM Started 10460 Check Point Security Management Server is running and ready <br>FWM Started 10007 <br> <br>Port Details: <br><nowiki>----------------</nowiki> <br>JETTY Internal Port: 50276 <br>APACHE Gaia Port: 443 <br><br> <br><nowiki>-------------------------------------------------</nowiki> <br>Overall API Status: Started <br><nowiki>-------------------------------------------------</nowiki> <br> <br>API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' f79f1a33a18f38736c02ff4171fee31e5a3a77d7 750 749 2018-04-22T22:00:48Z Nighthawk 1 /* status check */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' API Settings: <nowiki>-----------------</nowiki> Accessibility: Require all granted Automatic Start: Enabled Processes: <br> Name State PID More Information <nowiki>-------------------------------------------------</nowiki> API Started 10763 CPM Started 10460 Check Point Security Management Server is running and ready FWM Started 10007 <br> Port Details: <nowiki>----------------</nowiki> JETTY Internal Port: 50276 APACHE Gaia Port: 443 <br><br> <nowiki>-------------------------------------------------</nowiki> Overall API Status: Started <nowiki>-------------------------------------------------</nowiki> <br> API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 7500afe8d250c669dfed8d1907223ecd2c7f3df0 749 748 2018-04-22T21:59:29Z Nighthawk 1 /* status check */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' API Settings: --------------------- Accessibility: Require all granted Automatic Start: Enabled Processes: <br> Name State PID More Information <nowiki>-------------------------------------------------</nowiki> API Started 10763 CPM Started 10460 Check Point Security Management Server is running and ready FWM Started 10007 <br> Port Details: ------------------- JETTY Internal Port: 50276 APACHE Gaia Port: 443 <br><br> -------------------------------------------- Overall API Status: Started -------------------------------------------- <br> API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 4f2f7182f60482e9ebbe4e0447dc5d3106b9abae 748 747 2018-04-22T21:58:49Z Nighthawk 1 /* enabling for remote IPs */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] it can also be enabled via mgmt_cli under "set api-settings" ===status check=== [Expert@chmkmgr1:0]# '''api status''' API Settings: --------------------- Accessibility: Require all granted Automatic Start: Enabled Processes: <br> Name State PID More Information ------------------------------------------------- API Started 10763 CPM Started 10460 Check Point Security Management Server is running and ready FWM Started 10007 <br> Port Details: ------------------- JETTY Internal Port: 50276 APACHE Gaia Port: 443 <br><br> -------------------------------------------- Overall API Status: Started -------------------------------------------- <br> API readiness test SUCCESSFUL. The server is up and ready to receive connections ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 0ea7828974e0c917106a15d6acdcb81c34a9025f 747 746 2018-04-22T21:39:51Z Nighthawk 1 /* enabling for remote IPs */ wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done through the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 07707046e509cba2bdf02c2f9103a68688d8adf0 746 744 2018-04-22T21:39:32Z Nighthawk 1 wikitext text/x-wiki ==Management server API setup== ===enabling for remote IPs=== done through the smartconsole [[file:cp_mgmt_api_enable_all_IPs.png]] ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 1ed0965070272301214ed9533700dc397a0a93f0 744 743 2018-04-20T15:16:25Z Nighthawk 1 /* examples */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== show number of rules in policy mgmt_cli show access-rulebase name "<layer>" -s id.txt --format json | jq '.total' display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' c213cb5bcc78fa609fa17b048aa77f89107380dd 743 740 2018-04-20T15:02:16Z Nighthawk 1 /* show access layers? */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# '''mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network"''' "Network" where "Network" represents the default policy package Standard ===examples=== display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' c5a84fa750bd43846f3752a434106193593e2be4 740 739 2018-04-04T16:17:19Z Nighthawk 1 /* notes before you begin */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ====rule numbers==== ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===examples=== display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 5e76940a0e83d3285db0ba6992203b73b7705035 739 738 2018-04-04T16:16:59Z Nighthawk 1 /* rule numbers */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===examples=== display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' d70172e686a3115513a5d242c0e3165df311ce4c 738 737 2018-04-04T16:16:09Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===rule numbers=== display only the rule number for a rule with uid = xxx # '''mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx"''' display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 02869835bb00270342fcf93715d7dd1417aa3806 737 736 2018-03-28T18:55:59Z Nighthawk 1 /* access rules */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as shown by the show access-layers command below. Also, the output of show access-rulebase doesn't is limited to 50 rules. If you want more, I think you have to iterate though a set of offets until all the rules are dumped. That dump in json format is a bit confusing. If you have no "headers" or "titles" in the ruleset, you will get 1 rulebase[] array. If you have headers, each section is its own rulebase[] array with yet another rulebase[] array containing the actual rules. What this means is the commands below may or may not work as you expect them to. The will likely need to be altered with mgmt_cli "offset" commands and/or modified jq commands... for example, if you have NO headers in your policy and are running show access-rulebase, it will output the rules with | jq '.rulebase[]' if you DO HAVE headers, to output the rules you need | jq '.rulebase[] | .rulebase[]' ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display only the rule number for a rule with uid = xxx=== mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' ecb55a38488e5a5c10e7b75026bd05ee84a1cc75 736 735 2018-03-28T18:41:45Z Nighthawk 1 /* display rule by number */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display only the rule number for a rule with uid = xxx=== mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' c56254359ba7436d3f312251ab2af854022539f9 735 734 2018-03-28T17:57:40Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" display src/dst/service from rule with uid for i in source destination service; do echo $i; mgmt_cli -s id.txt show access-rule layer "<policy_name> <layer_name>" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" --format json | jq .$i[].name; done alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' c863b8877ee7aef5296d3e46dab1e272e2f1e22e 734 729 2018-03-28T17:53:50Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli -s id.txt show access-rule layer "My_policy Network" uid "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxx" alternate(inferior) way with jq mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 2a9b4ab9eebaead9c0eb73e54cd05f2712426400 729 728 2018-03-22T21:08:56Z Nighthawk 1 /* links */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] parsing json return output [https://stedolan.github.io/jq/ jq] [https://community.checkpoint.com/thread/1083 Parsing the output of mgmt_cli' 85d657ae8746862883ffe57546cbc6a7596a4050 728 727 2018-03-22T21:04:30Z Nighthawk 1 /* links */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] [https://github.com/CheckPointSW/cp_mgmt_api_python_sdk official python open source api] 22f6b41439152208ed92e1f84c20d8e97eb1fdd9 727 726 2018-03-22T19:26:09Z Nighthawk 1 /* access rules */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===notes before you begin=== when using the parameter "name" to refer to a particular package, it appears to require the following... <package name> <layer name> as show in by the sho access-layers command below ===show access layers?=== [Expert@chmkmgr1:0]# mgmt_cli show access-layers -s id.txt --format json | jq '."access-layers"[].name' "dropall Network" "Network" where "Network" represents the default policy package Standard ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] f30bd5ec75de2be0b8a3f37670a0f455df481e4d 726 725 2018-03-22T18:18:15Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' "rulenum": 1, <br> "comment": "hahahlol" ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] 6a2f343119919f4eb31287d26d42cb1dee214166 725 724 2018-03-22T18:17:47Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' <nowiki>{<br> <br> "rulenum": 1, <br> "comment": "hahahlol" <br>} </nowiki> ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] b613047fa1fd2603dfc62d5d566e277a8f44dfc7 724 723 2018-03-22T18:17:20Z Nighthawk 1 /* display only the rule number for a rule with uid = xxx */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' <nowiki>{ "rulenum": 1, "comment": "hahahlol" } </nowiki> ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] 5cf8a786875d857f3f2dd74220cc867ec30bbc14 723 722 2018-03-22T18:16:53Z Nighthawk 1 /* ==display rule by number */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 display rule number with comment containing a string haha mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.comments | contains("haha")) | {rulenum: ."rule-number", comment: .comments}' { "rulenum": 1, "comment": "hahahlol" } ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] e075a97acf079840acd2868c73ba544c07745c87 722 721 2018-03-22T17:56:12Z Nighthawk 1 /* display rule by number */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==access rules== ===display rule by number= show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ===display only the rule number for a rule with uid = xxx=== mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[] | select (.uid == "1de8fab0-4858-4067-977d-1cbb5cd2e55d") | ."rule-number"' 1 ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] c7918dc19f4e10c369ae96c3672eb387bdf73db1 721 720 2018-03-22T17:49:52Z Nighthawk 1 wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ===display rule by number=== show rule 1 from policy named Standard mgmt_cli show access-rulebase name "Network" -s id.txt package "Standard" show-hits true --format json | jq '.rulebase[0]' ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] 567875f1e11035294496bf9d841e304f6ab11082 720 712 2018-03-22T17:25:00Z Nighthawk 1 wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [https://stedolan.github.io/jq/ jq] e600d75d33d1ed91c8f0dbed1ac4f683b8795102 712 711 2018-01-31T22:54:57Z Nighthawk 1 /* search existing object */ wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP, return all objects that contain the ip explicitly or within a nework address space/range. # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' return only objects with the EXACT ip # mgmt_cli -s id.txt show objects filter "192.168.1.1" ip-only true details-level full --format json | jq '.objects[] | select(."ipv4-address" == "192.168.1.1") | .name' *** details-level full will include more objects, including other stuff like type CpmiHostCkp (built in smartcenter object) ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [phttps://stedolan.github.io/jq/ jq] c30114c1d0ff1062116810b628b9bbfc0638ffe9 711 709 2018-01-31T22:32:33Z Nighthawk 1 wikitext text/x-wiki ==examples== ===logging in=== login and redirect session info to a file for reuse # mgmt_cli login user admin > id.txt ===search existing object=== search objects by IP # mgmt_cli -s id.txt show objects filter "10.0.0.0" ip-only true --format json | jq '.objects[] | {name: .name, subnet: .subnet4, mask: ."mask-length4"}' ==links== [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [phttps://stedolan.github.io/jq/ jq] 7e063ee284bb74e574eeb77d2896061f0c1817a6 709 708 2018-01-29T15:31:14Z Nighthawk 1 Nighthawk moved page [[r80 api reference]] to [[r80 api notes]] wikitext text/x-wiki [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [phttps://stedolan.github.io/jq/ jq] d4ae5d60063dc4b465d133fc7b7bb263a739fca2 708 695 2018-01-29T15:30:57Z Nighthawk 1 wikitext text/x-wiki [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] parsing json return output [phttps://stedolan.github.io/jq/ jq] d4ae5d60063dc4b465d133fc7b7bb263a739fca2 695 2017-10-04T15:18:34Z Nighthawk 1 Created page with "[https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference]" wikitext text/x-wiki [https://sc1.checkpoint.com/documents/latest/APIs/index.html#introduction~v1.1%20 r80 api reference] 4e6a06c454ac611027b2744e8934410cf70a4312 r80 api reference 0 226 710 2018-01-29T15:31:15Z Nighthawk 1 Nighthawk moved page [[r80 api reference]] to [[r80 api notes]] wikitext text/x-wiki #REDIRECT [[r80 api notes]] 979a7bbfd543ea08ddc32075cbd77ad7e8ec02fa reboot logs 0 266 891 2024-01-17T15:30:03Z Nighthawk 1 Created page with "reboot log location /var/log/reboot.log especially significant for maestro, config reboot reasons... /var/log/configuration_reboot_reason.log" wikitext text/x-wiki reboot log location /var/log/reboot.log especially significant for maestro, config reboot reasons... /var/log/configuration_reboot_reason.log 30e864f03e6483893263c99234018c466159b588 revoking Check Point administrator certificates 0 181 526 525 2014-07-25T17:35:42Z Nighthawk 1 /* solution */ wikitext text/x-wiki == problem description == versions: Check Point R65 - R75 (guessing) products: reported on Provider-1, but could be relavant for a Smartcenter / Smart-1 Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, sometimes the certificate generation will fail. An exact error message is not documented here. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith | grep -C 1 -i valid ''' -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith | grep -C 1 -i valid''' -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 525 524 2014-07-25T17:35:02Z Nighthawk 1 /* solution */ wikitext text/x-wiki == problem description == versions: Check Point R65 - R75 (guessing) products: reported on Provider-1, but could be relavant for a Smartcenter / Smart-1 Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, sometimes the certificate generation will fail. An exact error message is not documented here. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith | grep -C 1 -i valid ''' -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith | grep -C 1 -i valid''' -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 524 523 2014-07-25T17:34:37Z Nighthawk 1 /* solution */ wikitext text/x-wiki == problem description == versions: Check Point R65 - R75 (guessing) products: reported on Provider-1, but could be relavant for a Smartcenter / Smart-1 Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, sometimes the certificate generation will fail. An exact error message is not documented here. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith''' | grep -C 1 -i valid -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# cpca_client lscert | grep -A 2 -i johnsmith | grep -C 1 -i valid -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 523 522 2014-07-25T17:24:32Z Nighthawk 1 /* problem description */ wikitext text/x-wiki == problem description == versions: Check Point R65 - R75 (guessing) products: reported on Provider-1, but could be relavant for a Smartcenter / Smart-1 Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, sometimes the certificate generation will fail. An exact error message is not documented here. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith''' Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 Status = Revoked Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# cpca_client lscert | grep -A 2 -i johnsmith Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 522 521 2014-07-25T17:24:24Z Nighthawk 1 /* problem description */ wikitext text/x-wiki == problem description == versions: Check Point R65 - R75 (guessing) products: reported on Provider-1, but could be relavant for a Smartcenter / Smart-1 Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, sometimes the certificate generation will fail. An exact error message is not documented here. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith''' Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 Status = Revoked Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# cpca_client lscert | grep -A 2 -i johnsmith Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 521 520 2014-07-25T17:12:46Z Nighthawk 1 wikitext text/x-wiki == problem description == Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, the certificate generation will fail. == solution == no return value from above, so account non-existent 1. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith''' Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 Status = Revoked Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 2. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 3. verify all certs have a status of revoked [Expert@P1server]# cpca_client lscert | grep -A 2 -i johnsmith Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done 520 2014-07-25T16:54:45Z Nighthawk 1 Created page with " == problem description == Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without fir..." wikitext text/x-wiki == problem description == Sometimes the need arises to revoke a user's certificate via CLI. One such situation is one where an administrator account was deleted without first revoking the certificate in the GUI. This will delete the user but leave the user certificate behind. If you try to recreate a user with the same name and generate a certificate, the certificate generation will fail. == solution == 1. verify the user account does NOT currently exist... [Expert@P1server]# cpmiquerybin attr "mdsdb" pv1_administrators "type='pv1_administrator'" -a __name__ | grep -i johnsmith no return value from above, so account non-existent 2. list current certs for user [Expert@P1server]# '''cpca_client lscert | grep -A 2 -i johnsmith''' Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 Status = Revoked Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Valid''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- 3. revoke valid certs by referencing the CNs from above [Expert@P1server]# '''cpca_client revoke_cert -n "CN=johnsmith,OU=users,O=P1server..rsyqv9"''' Certificate was revoked successfully 4. verify all certs have a status of revoked [Expert@P1server]# cpca_client lscert | grep -A 2 -i johnsmith Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 26247 DP = 0 Not_Before: Mon Dec 9 20:30:28 2013 Not_After: Sun Dec 9 20:30:28 2018 -- Subject = CN=johnsmith,OU=users,O=P1server..rsyqv9 '''Status = Revoked''' Kind = SIC Serial = 47765 DP = 0 Not_Before: Fri Mar 28 04:57:09 2014 Not_After: Thu Mar 28 04:57:09 2019 -- done rewriting grub mbr 0 217 677 676 2017-08-15T22:01:45Z Nighthawk 1 wikitext text/x-wiki grub> '''root (hd0,0)''' grub> '''setup (hd0)''' Checking if "/boot/grub/stage1" exists... no Checking if "/grub/stage1" exists... yes Checking if "/grub/stage2" exists... yes Checking if "/grub/e2fs_stage1_5" exists... yes Running "embed /grub/e2fs_stage1_5 (hd0)"... 15 sectors are embedded. succeeded Running "install /grub/stage1 (hd0) (hd0)1+15 p (hd0,0)/grub/stage2 /grub/grub.conf"...succeeded Done. 4072e8b378575237c7b5eea12833e5148dc3d110 676 675 2017-08-15T22:01:24Z Nighthawk 1 wikitext text/x-wiki grub> root (hd0,0) grub> setup (hd0) Checking if "/boot/grub/stage1" exists... no Checking if "/grub/stage1" exists... yes Checking if "/grub/stage2" exists... yes Checking if "/grub/e2fs_stage1_5" exists... yes Running "embed /grub/e2fs_stage1_5 (hd0)"... 15 sectors are embedded. succeeded Running "install /grub/stage1 (hd0) (hd0)1+15 p (hd0,0)/grub/stage2 /grub/grub.conf"...succeeded Done. e472009a8a2724b638b49c585ffc535bb56bf1ce 675 672 2017-08-15T22:00:37Z Nighthawk 1 wikitext text/x-wiki grub> root (hd0,0) grub> setup (hd0) Checking if "/boot/grub/stage1" exists... no Checking if "/grub/stage1" exists... yes Checking if "/grub/stage2" exists... yes Checking if "/grub/e2fs_stage1_5" exists... yes Running "embed /grub/e2fs_stage1_5 (hd0)"... 15 sectors are embedded. succeeded Running "install /grub/stage1 (hd0) (hd0)1+15 p (hd0,0)/grub/stage2 /grub/grub.conf"...succeeded Done. grub> b28d1394468fe51d1832aaa89b15731bab7ad377 672 2017-08-09T04:42:41Z Nighthawk 1 Created page with " grub> '''root (hd0,0)''' grub> '''setup (hd0,0)''' Checking if "/boot/grub/stage1" exists... no Checking if "/grub/stage1" exists... yes Checking if "/grub/stage2" exis..." wikitext text/x-wiki grub> '''root (hd0,0)''' grub> '''setup (hd0,0)''' Checking if "/boot/grub/stage1" exists... no Checking if "/grub/stage1" exists... yes Checking if "/grub/stage2" exists... yes Checking if "/grub/e2fs_stage1_5" exists... yes Running "embed /grub/e2fs_stage1_5 (hd0,0)"... failed (this is not fatal) Running "embed /grub/e2fs_stage1_5 (hd0,0)"... failed (this is not fatal) Running "install /grub/stage1 (hd0,0) /grub/stage2 p /grub/grub.conf "... succ eeded Done. grub> 58ed0c0030377828871d9029c96b65cb7fafb8af running SmartConsole in wine on linux 0 169 487 486 2014-05-27T02:30:34Z Nighthawk 1 /* links */ wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg set windows version to Windows7 [[file:wine_smartconsole_install-winver.png]] '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you should see the dot net windows install, license accept windows. It will go through the 2.0 and then the 2.0 SP2 installs. $ winetricks dotnet40 ... similar to above this one may be optional $ winetricks gdiplus == install smartconsole == $ wine ./Check_Point_SmartConsole_and_SmartDomain_Manager_R77.10_T131_B990150213_Windows.exe You should see something like this... then proceed to install like you would on winblows [[file:wine32_smartconsole_install-ok.png]] If you see something like this... [[file:wine32_smartconsole_install-bad.png]] ... then something is screwed up. The check point installer should not be trying to install the .net packages. We already did that in earlier steps using winetricks. == links == [http://wine-wiki.org/index.php/WINEPREFIX WINEPREFIX info] <br>[http://wiki.winehq.org/FAQ#head-8d9263369d4c6d93a7cbacf2415377778c679d32 How do I create a 32 bit wineprefix on a 64 bit system?] <br>[http://appdb.winehq.org/objectManager.php?iId=3754&sClass=version wine.NET Framework > 2.0] <br>[https://appdb.winehq.org/objectManager.php?sClass=version&iId=17886 wine .NET Framework > 4.0] 486 485 2014-05-27T02:30:16Z Nighthawk 1 wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg set windows version to Windows7 [[file:wine_smartconsole_install-winver.png]] '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you should see the dot net windows install, license accept windows. It will go through the 2.0 and then the 2.0 SP2 installs. $ winetricks dotnet40 ... similar to above this one may be optional $ winetricks gdiplus == install smartconsole == $ wine ./Check_Point_SmartConsole_and_SmartDomain_Manager_R77.10_T131_B990150213_Windows.exe You should see something like this... then proceed to install like you would on winblows [[file:wine32_smartconsole_install-ok.png]] If you see something like this... [[file:wine32_smartconsole_install-bad.png]] ... then something is screwed up. The check point installer should not be trying to install the .net packages. We already did that in earlier steps using winetricks. == links == [http://wine-wiki.org/index.php/WINEPREFIX WINEPREFIX info] [http://wiki.winehq.org/FAQ#head-8d9263369d4c6d93a7cbacf2415377778c679d32 How do I create a 32 bit wineprefix on a 64 bit system?] [http://appdb.winehq.org/objectManager.php?iId=3754&sClass=version wine.NET Framework > 2.0] [https://appdb.winehq.org/objectManager.php?sClass=version&iId=17886 wine .NET Framework > 4.0] 485 482 2014-05-26T20:46:22Z Nighthawk 1 /* install smartconsole */ wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg set windows version to Windows7 [[file:wine_smartconsole_install-winver.png]] '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you should see the dot net windows install, license accept windows. It will go through the 2.0 and then the 2.0 SP2 installs. $ winetricks dotnet40 ... similar to above this one may be optional $ winetricks gdiplus == install smartconsole == $ wine ./Check_Point_SmartConsole_and_SmartDomain_Manager_R77.10_T131_B990150213_Windows.exe You should see something like this... then proceed to install like you would on winblows [[file:wine32_smartconsole_install-ok.png]] If you see something like this... [[file:wine32_smartconsole_install-bad.png]] ... then something is screwed up. The check point installer should not be trying to install the .net packages. We already did that in earlier steps using winetricks. 482 481 2014-05-26T20:40:12Z Nighthawk 1 /* wine setup */ wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg set windows version to Windows7 [[file:wine_smartconsole_install-winver.png]] '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you should see the dot net windows install, license accept windows. It will go through the 2.0 and then the 2.0 SP2 installs. $ winetricks dotnet40 ... similar to above this one may be optional $ winetricks gdiplus == install smartconsole == 481 479 2014-05-26T20:39:43Z Nighthawk 1 wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg set windows version to Windows7 [[file:wine_smartconsole_install-winver.png]] example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you should see the dot net windows install, license accept windows. It will go through the 2.0 and then the 2.0 SP2 installs. $ winetricks dotnet40 ... similar to above this one may be optional $ winetricks gdiplus == install smartconsole == 479 2014-05-26T20:23:27Z Nighthawk 1 Created page with " == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == ..." wikitext text/x-wiki == versions == wine: 1.7.18 winetricks: 20140302 smartconsole: R77.10_T131_B990150213 O.S.: gentoo linux == prerequisites == install wine and winetricks on your distro == wine setup == '''create a 32 bit wineprefix''' (if you don't already have one) command WINEARCH=win32 WINEPREFIX=/path/to/wineprefix winecfg example $ WINEARCH=win32 WINEPREFIX=$HOME/.wine32 winecfg '''set environment''' $ export WINEPREFIX=$HOME/.wine32 $ echo $WINEPREFIX /home/jsmith/.wine32 Install .net 2.0 SP2 using winetricks $ winetricks dotnet20sp2 ...you secureplatform cron 0 100 171 170 2013-07-18T00:45:01Z Nighthawk 1 /* crontab file examples */ wikitext text/x-wiki root crons configured by running '''crontab -e''' at expert prompt cron file will be save to... /var/spool/cron/root == cron file format == Each line in the /etc/crontab file represents a job and has the following format: minute hour day month dayofweek command minute — any integer from 0 to 59 hour — any integer from 0 to 23 day — any integer from 1 to 31 (must be a valid day if a month is specified) month — any integer from 1 to 12 (or the short name of the month such as jan or feb) dayofweek — any integer from 0 to 7, where 0 or 7 represents Sunday (or the short name of the week such as sun or mon) command — the command to execute (the command can either be a command such as ls /proc >> /tmp/proc or the command to execute a custom script) == crontab file examples == 01 * * * * /usr/local/bin/cron.hourly.sh 02 4 * * * /usr/local/bin/cron.daily.sh 22 4 * * 0 /usr/local/bin/cron.weekly.sh 42 4 1 * * /usr/local/bin/cron.monthly.sh [[category:sysadmin]] 170 169 2013-07-18T00:44:48Z Nighthawk 1 wikitext text/x-wiki root crons configured by running '''crontab -e''' at expert prompt cron file will be save to... /var/spool/cron/root == cron file format == Each line in the /etc/crontab file represents a job and has the following format: minute hour day month dayofweek command minute — any integer from 0 to 59 hour — any integer from 0 to 23 day — any integer from 1 to 31 (must be a valid day if a month is specified) month — any integer from 1 to 12 (or the short name of the month such as jan or feb) dayofweek — any integer from 0 to 7, where 0 or 7 represents Sunday (or the short name of the week such as sun or mon) command — the command to execute (the command can either be a command such as ls /proc >> /tmp/proc or the command to execute a custom script) == crontab file examples == 01 * * * * /usr/local/bin/cron.hourly.sh 02 4 * * * /usr/local/bin/cron.daily.sh 22 4 * * 0 /usr/local/bin/cron.weekly.sh 42 4 1 * * /usr/local/bin/cron.monthly.sh [[category:sysadmin]] 169 2013-07-18T00:39:57Z Nighthawk 1 Created page with "root crons configured by running '''crontab -e''' at expert prompt cron file will be save to... /var/spool/cron/root [[category:sysadmin]]" wikitext text/x-wiki root crons configured by running '''crontab -e''' at expert prompt cron file will be save to... /var/spool/cron/root [[category:sysadmin]] set palo alto firewall management interface ip 0 185 552 2015-01-21T22:49:32Z Nighthawk 1 Created page with " set deviceconfig system ip-address 192.168.2.1 netmask 255.255.255.0 [[category:PAN]] [[category:palo alto]]" wikitext text/x-wiki set deviceconfig system ip-address 192.168.2.1 netmask 255.255.255.0 [[category:PAN]] [[category:palo alto]] setting interface affinity 0 221 701 700 2017-10-22T06:36:22Z Nighthawk 1 wikitext text/x-wiki example (77.30) set affinity # '''sim affinity -s''' Usage : For each interface enter one of the following: Return - To keep the default values (appearing in [ ]) all - To allow all processors for this interface List of processors - A list of processor numbers between 0 and 19 eth1-01 [All] : '''0''' eth1-02 [All] : '''0''' eth2-01 [All] : '''1''' eth2-02 [All] : '''2''' eth3-01 [All] : '''3''' eth3-02 [All] : '''4''' eth3-04 [All] : '''5''' check affinity # sim affinity -l or # fw ctl affinity -l -r c5bdf6258fda45348382469950021e0c754e6f16 700 699 2017-10-22T06:34:46Z Nighthawk 1 wikitext text/x-wiki example (77.30) set affinity # '''sim affinity -s''' Usage : For each interface enter one of the following: Return - To keep the default values (appearing in [ ]) all - To allow all processors for this interface List of processors - A list of processor numbers between 0 and 19 eth1-01 [All] : '''0''' eth1-02 [All] : '''0''' eth2-01 [All] : '''1''' eth2-02 [All] : '''2''' eth3-01 [All] : '''3''' eth3-02 [All] : '''4''' eth3-04 [All] : '''5''' check affinity # fw ctl affinity -l -r ff3d40de8eacd7894045ac328d5c921e1397c7c8 699 698 2017-10-22T04:27:04Z Nighthawk 1 wikitext text/x-wiki example (77.30) # '''sim affinity -s''' Usage : For each interface enter one of the following: Return - To keep the default values (appearing in [ ]) all - To allow all processors for this interface List of processors - A list of processor numbers between 0 and 19 eth1-01 [All] : '''0''' eth1-02 [All] : '''0''' eth2-01 [All] : '''1''' eth2-02 [All] : '''2''' eth3-01 [All] : '''3''' eth3-02 [All] : '''4''' eth3-04 [All] : '''5''' 867ad5126c74271b00036f0d5e252201c20349ee 698 697 2017-10-22T04:26:41Z Nighthawk 1 wikitext text/x-wiki example (77.30) # '''sim affinity -s''' Usage : For each interface enter one of the following: Return - To keep the default values (appearing in [ ]) all - To allow all processors for this interface List of processors - A list of processor numbers between 0 and 19 eth1-01 [All] : eth1-02 [All] : '''0''' eth2-01 [All] : '''1''' eth2-02 [All] : '''2''' eth3-01 [All] : '''3''' eth3-02 [All] : '''4''' eth3-04 [All] : '''5''' 3c3e2cc00a16ddf9438822e1678a5bde6783cdc8 697 2017-10-22T04:19:32Z Nighthawk 1 Created page with " # sim affinity -s" wikitext text/x-wiki # sim affinity -s 1e3e1143fb904bd9e0c7a6f4111c3eee4d8adf5d shell inactivity timout 0 177 564 563 2015-09-28T16:53:11Z Nighthawk 1 /* view the current idle timeout */ wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values ==newer Gaia versions== In Clish: ===view the current idle timeout=== For Gaia Web Portal session: HostName> '''show web session-timeout''' For Clish session: HostName> '''show inactivity-timeout''' ===To change the current idle=== For Gaia Portal session: HostName> '''set web session-timeout VALUE''' For Clish session: HostName> '''set inactivity-timeout VALUE''' Don't forget to save the config changes above ==older CP versions== versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. === check current timeout value === [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... === changing timeout value === [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user === shell startup code === The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 563 562 2015-09-28T16:52:50Z Nighthawk 1 /* To change the current idle */ wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values ==newer Gaia versions== In Clish: ===view the current idle timeout=== For Gaia Web Portal session: HostName> show web session-timeout For Clish session: HostName> show inactivity-timeout ===To change the current idle=== For Gaia Portal session: HostName> '''set web session-timeout VALUE''' For Clish session: HostName> '''set inactivity-timeout VALUE''' Don't forget to save the config changes above ==older CP versions== versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. === check current timeout value === [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... === changing timeout value === [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user === shell startup code === The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 562 561 2015-09-28T16:52:27Z Nighthawk 1 /* newer Gaia versions */ wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values ==newer Gaia versions== In Clish: ===view the current idle timeout=== For Gaia Web Portal session: HostName> show web session-timeout For Clish session: HostName> show inactivity-timeout ===To change the current idle=== For Gaia Portal session: HostName> set web session-timeout VALUE For Clish session: HostName> set inactivity-timeout VALUE Don't forget to save the config changes above ==older CP versions== versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. === check current timeout value === [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... === changing timeout value === [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user === shell startup code === The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 561 560 2015-09-28T16:50:33Z Nighthawk 1 wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values ==newer Gaia versions== In Clish: To see the current idle timeout: For Gaia Portal session: HostName> show web session-timeout For Clish session: HostName> show inactivity-timeout To change the current idle timeout on-the-fly: For Gaia Portal session: HostName> set web session-timeout VALUE For Clish session: HostName> set inactivity-timeout VALUE ==older CP versions== versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. === check current timeout value === [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... === changing timeout value === [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user === shell startup code === The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 560 501 2015-09-28T16:49:46Z Nighthawk 1 wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values ==newer Gaia versions== In Clish: To see the current idle timeout: For Gaia Portal session: HostName> show web session-timeout For Clish session: HostName> show inactivity-timeout To change the current idle timeout on-the-fly: For Gaia Portal session: HostName> set web session-timeout VALUE For Clish session: HostName> set inactivity-timeout VALUE versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. == check current timeout value == [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... == changing timeout value == [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user == shell startup code == The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 501 500 2014-06-10T21:08:41Z Nighthawk 1 /* changing timeout value */ wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. == check current timeout value == [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... == changing timeout value == [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# '''cat /etc/cpshell/cpshell.state | grep idle''' idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user == shell startup code == The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 500 499 2014-06-10T21:08:06Z Nighthawk 1 /* changing timeout value */ wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. == check current timeout value == [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... == changing timeout value == [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' --- note, an "Expert" prompt doesn't mean your account has root priveleges. when running the idle command from cpshell for the first time, it creates the following file: /etc/cpshell/cpshell.state this file containes the idle setting [Expert@myfirewall]# cat /etc/cpshell/cpshell.state | grep idle idle=15 This file gets parsed by /etc/bashrc when setting up a shell for a newly connected user == shell startup code == The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 499 498 2014-06-10T20:48:03Z Nighthawk 1 wikitext text/x-wiki Gaia and SPLAT shell/ssh timout values versions: Tested for SPLAT R75.30 & Gaia R75 & R77.10 the shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. == check current timeout value == [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... == changing timeout value == [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' *** note, an "Expert" prompt doesn't mean your account has root priveleges. == shell startup code == The TMOUT value is set by /etc/bashrc. You can alter the global bashrc or configure local ones for user accounts. Rather than change the global bashrc, the examples above utilize cpshell to set it. If you want to change the global bashrc file, below are the snippets of code that control it from a couple of different releases. example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 498 497 2014-06-10T20:43:17Z Nighthawk 1 wikitext text/x-wiki shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' *** note, an "Expert" prompt doesn't mean your account has root priveleges. The value is set by /etc/bashrc example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` example /etc/bashrc from Check Point SecurePlatform R75.30 # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash <br># Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 497 496 2014-06-10T20:42:17Z Nighthawk 1 wikitext text/x-wiki shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use cpshell with account that has root privelege access on SPLAT or Gaia, and set the ilde time... [Expert@myfirewall]# '''cpshell''' set idle time in minutes [myfirewall]# '''idle 15''' if you want it to take effect in your current shell... exit cpshell, from the expert prompt... [Expert@myfirewall]# '''source /etc/bashrc ''' *** note, an "Expert" prompt doesn't mean your account has root priveleges. The value is set by /etc/bashrc example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash example /etc/bashrc from Check Point SecurePlatform R75.30 # Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] 496 2014-06-10T20:33:22Z Nighthawk 1 Created page with "shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check poi..." wikitext text/x-wiki shell timeout for ssh session is controlled by an environment variable called TMOUT. it is a ridiculously annoyingly low 180 seconds / 3 minutes by default for many check point platforms. [Expert@myfirewall:0]# '''echo $TMOUT''' 600 to change it, use the admin account on SPLAT or Gaia, and set the ilde time... The value is set by /etc/bashrc example /etc/bashrc from Check Point Gaia R77.10 # SPLAT specific setup IDLE="`sed -n 's/idle=//p' /etc/cpshell/cpshell.state 2>/dev/null`" [ -z "$IDLE" ] && IDLE=3 export TMOUT=`expr $IDLE \* 60` # By default, log out the user after three minutes of unattended prompt export TMOUT=180 export SHELL=/bin/bash example /etc/bashrc from Check Point SecurePlatform R75.30 # Take into account idle setting of cpshell, if available if [ -f /etc/cpshell/cpshell.state ]; then idle=`grep idle /etc/cpshell/cpshell.state | sed s/idle=//` if [ $idle"UNDEFINED" = "UNDEFINED" ]; then idle=3 fi export TMOUT=`expr $idle \* 60` fi [[category:CLI]] show interface statistics for up interfaces only 0 186 704 674 2017-12-03T03:56:52Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell show IPs/masks <source lang="bash"> # clish -c "show interfaces all" | grep -B 1 "state on" | grep Interface | grep -v " lo" | awk '{print $2}' | while read line; do printf "$line "; clish -c "show interface $line ipv4-address"; done </source> show speeds <source lang="bash"> # clish -c "show interfaces all" | grep -B 1 "state on" | grep Interface | grep -v " lo" | awk '{print $2}' | while read line; do printf "$line "; clish -c "show interface $line speed"; done </source> interface statistics <source lang="bash"> # clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" |\ grep -v ^$; done </source> this will only work from the BASH shell, NOT csh. old ipso... [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 47ec24268456c11cdaf64f7415ea5220a8f2215b 674 673 2017-08-10T11:17:20Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell show IPs/masks <source lang="bash"> # clish -c "show interfaces all" | grep -B 1 "state on" | grep Interface | grep -v " lo" | awk '{print $2}' | while read line; do printf "$line "; clish -c "show interface $line ipv4-address"; done </source> interface statistics <source lang="bash"> # clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" |\ grep -v ^$; done </source> this will only work from the BASH shell, NOT csh. old ipso... [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 35bae5f80213b0ad921c81bcf8fd8a80036376ad 673 600 2017-08-10T11:14:47Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell show IPs/masks <source lang="bash"> # clish -c "show interfaces all" | grep -B 1 "state on" | grep Interface | grep -v " lo" | awk '{print $2}' | while read line; do printf "$line "; clish -c "show interface $line ipv4-address"; done # clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" |\ grep -v ^$; done </source> this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 2d573449efbf2c7f9f830a949e4e327ce1162c95 600 599 2016-07-23T07:53:07Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell <source lang="bash"> [Expert@chkpfw1:0]# clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" |\ grep -v ^$; done </source> this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 3768fb46caff8e6b3132adb31668ed71628fd658 599 598 2016-07-23T07:38:58Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell <syntaxhighlight lang="bash"> [Expert@chkpfw1:0]# clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" | grep -v ^$; done </syntaxhighlight> this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 1469652af6a2b4b9d7587271690c3cd1fc0b62e5 598 555 2016-07-23T07:36:18Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell <syntaxhighlight lang="bash"> [Expert@chkpfw1:0]# clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" | grep -v ^$; done </syntaxhighlight> this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done dd228ce69d21001f5ede9e033536e5f7670942b7 555 554 2015-02-25T16:56:50Z Nighthawk 1 moved [[nokia IPSO show all up interface statistics]] to [[show interface statistics for up interfaces only]] wikitext text/x-wiki gaia from bash shell [Expert@chkpfw1:0]# clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" | grep -v ^$; done this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 554 553 2015-02-25T16:56:17Z Nighthawk 1 wikitext text/x-wiki gaia from bash shell [Expert@chkpfw1:0]# clish -c "show interfaces" | while read LINE; do echo; echo $LINE; clish -c "show interface $LINE statistics" | grep -v ^$; done this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done 553 2015-02-25T16:23:59Z Nighthawk 1 Created page with "this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk..." wikitext text/x-wiki this will only work from the BASH shell, NOT csh. [root@myfw ~]# clish -c "show interfaces" | grep -B 1 " Up" | grep "Physical Interface" | grep -v -E "loop0|Tunnel" | awk '{print $3}' | while read LINE; do clish -c "show interface $LINE statistics"; done [[category:nokia]] [[category:ipso]] smart reporter 0 208 654 653 2017-05-06T02:27:24Z Nighthawk 1 /* tables */ wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==logging and session status== log consolidation session log: $RTDIR/log_consolidator_engine/log/<Session_ID>/lc_rt.log example of successful log consolidation entry... Last processed file: 2017-03-01_235900.log <br>The Engine has finished scanning the requested log files. ==service stop and start== rmdstop -server to stop ==tables== == fwaction == fw_action_code | fw_action_name <br> -1 | 0 | consolidated 1 | encrypt 2 | approved 3 | accept 4 | blocked 5 | drop 6 | reject ... and more... [[category:loggin]] 0a0f5f4d8a1a273cd380652c6abd46d503ac3fe1 653 652 2017-05-06T01:29:46Z Nighthawk 1 wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==logging and session status== log consolidation session log: $RTDIR/log_consolidator_engine/log/<Session_ID>/lc_rt.log example of successful log consolidation entry... Last processed file: 2017-03-01_235900.log <br>The Engine has finished scanning the requested log files. ==service stop and start== rmdstop -server to stop ==tables== ... [[category:loggin]] 125bce4c5ce3009846f21c6379033645d60589de 652 651 2017-05-05T13:26:48Z Nighthawk 1 /* logging and session status */ wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==logging and session status== log consolidation session log: $RTDIR/log_consolidator_engine/log/<Session_ID>/lc_rt.log example of successful log consolidation entry... Last processed file: 2017-03-01_235900.log <br>The Engine has finished scanning the requested log files. ==service stop and start== rmdstop -server to stop [[category:loggin]] d674e57d34e09af46f075acd7df02674a46483f6 651 644 2017-05-05T13:26:31Z Nighthawk 1 wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==logging and session status== log consolidation session log: $RTDIR/log_consolidator_engine/log/<Session_ID>/lc_rt.log example of successful log consolidation entry... Last processed file: 2017-03-01_235900.log The Engine has finished scanning the requested log files. ==service stop and start== rmdstop -server to stop [[category:loggin]] 2e97ab982d07e77c31565fae8c1dec78482b2490 644 643 2017-05-02T20:36:44Z Nighthawk 1 /* postgresql */ wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==rmdstop -server to stop [[category:loggin]] 194efe630d7306325766b01ff9896f621f1aaf19 643 642 2017-05-02T20:36:36Z Nighthawk 1 wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock ==postgresql== connecting to postgresql database CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==rmdstop -server to stop [[category:loggin]] 438c38f601c5de47bd9919ad997dea1968ac8de9 642 637 2017-05-02T05:38:15Z Nighthawk 1 wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. ==mysql database== username for mysql connections: RMSERVER password can me set in smartreporter gui under management > database maintenance > change database password mysql binary location: $RTDIR/Database/bin/mysql socket file: use as defined in $RTDIR/Database/conf/my.cnf example command to connect to local database $RTDIR/Database/bin/mysql -u RMSERVER -h localhost -p --socket=/opt/CPrt-R75.40/Database/mysql.sock connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==rmdstop -server to stop [[category:loggin]] 71dbfa3b2f93bffabd4ab73e0d357ebc1f9bc273 637 634 2017-04-30T19:28:00Z Nighthawk 1 wikitext text/x-wiki ==databases and versions== SmartReporter Database Management This release can use one of these SQL databases: • MySQL - When you upgrade from R75.40 or earlier to R77, SmartReporter continues to use the legacy • MySQL database. In some cases, upgrading from R75.20 or R75.40 can also use MySQL. PostgreSQL - All new installations of SmartReporter, from R75.40VS and higher, use the PostgreSQL database. You do database management operations in these ways: • With the SmartReporter Database Maintenance view • With CLI commands. MySQL and PostgreSQL have different commands and procedures • Changing SmartReporter configuration files '''To see which SQL database is installed, run:''' grep DefaultDatabase $CPDIR/registry/HKLM_registry.data If the command returns the string PostgreSQL, the database is PostgreSQL. If the command returns another result, the database is MySQL. connecting to postgresql database $CPDIR/database/postgresql/bin/psql -U cp_postgres -p 18272 rt_database ==rmdstop -server to stop [[category:loggin]] 8df0e800e55b741c1647b2d5a3b0fc3d7e24cc34 634 2017-04-30T01:55:58Z Nighthawk 1 Created page with " rmdstop -server to stop [[category:loggin]]" wikitext text/x-wiki rmdstop -server to stop [[category:loggin]] b95ea51d3b6665fcf47dd4ac228dbcaace3577e2 smartlog data path 0 222 702 2017-11-10T18:32:00Z Nighthawk 1 Created page with "r77 index paths... /var/log/opt/CPmds-R77/customers/<customer_name>/CPSmartLog-R77/data/ default data kept = 14 days" wikitext text/x-wiki r77 index paths... /var/log/opt/CPmds-R77/customers/<customer_name>/CPSmartLog-R77/data/ default data kept = 14 days 66e05e5fea3ef575b16bf5c27bceb8a1086bfccc smartupdate license repository commands 0 227 816 815 2018-06-23T12:51:33Z Nighthawk 1 /* cplic del - delete license from repo */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the job of the license repository/database on the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br><br>[Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''WARNING - use with care! deleting a license from an online gateway can cause an outage.''' <br>'''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] c8576191d1f029dff8e9197361f700e2435426fd 815 814 2018-06-23T12:51:23Z Nighthawk 1 /* cplic del - delete license from repo */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the job of the license repository/database on the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br><br>[Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''WARNING - use with care! deleting a license from an online gateway can cause an outage.''' '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 67d7fafe23bd70b015a27371a429871a5ee306ca 814 813 2018-06-23T12:50:26Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the job of the license repository/database on the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br><br>[Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 9ba1b2b87872d255b80b259fd0758d7ddb2314eb 813 812 2018-06-23T12:49:32Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br><br>[Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 1dc3609ac8f99a91e30bc5515289c574282a2b85 812 811 2018-06-23T12:48:47Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... &nbsp<br>[Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] d188725c96c9907783342e9732e0306ca80dcfa6 811 810 2018-06-23T12:48:31Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] <br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br>&nbsp [Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 315039c0dec80e9d9961def83f64ad3d92fdf783 810 809 2018-06-23T12:47:51Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] >br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br> [Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br> Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 7d62fb16448a268ce123132bbb8c68cf78e0d845 809 808 2018-06-23T12:47:35Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] >br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br> [Expert@chkpmgr1:0]# '''cplic get chkpfw1''' <br>&nbsp Getting licenses from chkpfw1 ... <br>chkpfw1: <br>Retrieved 1 licenses <br>Detached 1 licenses <br>Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 2e098c5c3a5f2b218044067b529d52d6087d8216 808 807 2018-06-23T12:46:15Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] >br>example: pretend there was a hardware failure, and RMA was performed, the new firewall is up and running backup config produced by clish "show configuration" as run on the failed device prior to failure. the backup config doesn't include the license. this is the license repo of the management device (smartcenter or provider-1 CMA). however; it will show as attached to the firewall because that was the last license status before the failure. so, to "detach" it in the repo we can run the command as follows... <br> [Expert@chkpmgr1:0]# cplic get chkpfw1 Getting licenses from chkpfw1 ... chkpfw1: Retrieved 1 licenses Detached 1 licenses Removed 0 licenses =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] 5e2520ba6f3ea6689d9eecc917dabf2f2f7b98ea 807 806 2018-06-23T12:40:54Z Nighthawk 1 /* delete license from repo */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> =='''cplic del''' - delete license from repo== '''Description''' Delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. Used for both local and remote machines cplic del [-F <output file>] <signature> <object name> [[category:license]] [[category:cli]] [[category:smartupdate]] cca1b4c0ae33976c1040f20124c5b91c083468ea 806 805 2018-06-23T12:38:39Z Nighthawk 1 /* Print licenses in database/repository */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf =='''cplic db_print''' - Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] 092c21154acda7339c9c71b9cac0e17b24966f71 805 804 2018-06-23T12:38:19Z Nighthawk 1 /* Print licenses in database/repository */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== '''Description''' Displays the details of Check Point licenses stored in the license repository on the Security Management Server. cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] fd7b2d77ba4f466dc582b5d21ed288d7cadd7518 804 803 2018-06-23T12:37:39Z Nighthawk 1 /* cplic db_add - add license to device or repository */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] 40184e83a75b5f888f73a40a353a5853e6e82951 803 802 2018-06-23T12:37:16Z Nighthawk 1 /* add license to device or repository */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] =='''cplic db_add''' - add license to device or repository== '''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. cplic db_add < -l license-file | host expiration-date signature SKU/features > =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] 6cc964f3df3fd6cf466f28f971bafa35af5183fc 802 801 2018-06-23T12:36:41Z Nighthawk 1 /* cplic get - retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. cplic get {<ipaddr>|<hostname>|-all} [-v41] =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] d4428a70b8c6365f7d19a9ead6ce08e423d92549 801 800 2018-06-23T12:36:19Z Nighthawk 1 /* retrieve/sync repo with remote gateways */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. =='''cplic get''' - retrieve/sync repo with remote gateways== '''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] a086ffee550caa4ab3291e2c651d2cd43f99dc98 800 799 2018-06-23T12:35:53Z Nighthawk 1 /* add local or attach license remotely */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. =='''cplic put''' - add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] bcb084b7e427c9e2537df460df9dad9c1d20c275 799 798 2018-06-23T12:35:23Z Nighthawk 1 /* add local or attach license remotely */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] 4f3f3823612693e31d1aa501ed37dcf28996f1f7 798 797 2018-06-23T12:35:03Z Nighthawk 1 /* add local or attach license remotely */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. ==delete license from repo== '''Remove license from database''' cplic db_rm <signature> [[category:license]] 68c44ca0daadb88bf98441437a4d10b4d62f87d6 797 796 2018-06-23T12:34:23Z Nighthawk 1 /* add local or attach license remotely */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. '''Remove license from database''' cplic db_rm <signature> [[category:license]] cac960317ebdbc3e9c3d465bcf5395cba02dd8fb 796 795 2018-06-23T12:33:58Z Nighthawk 1 /* add local or attach license remotely */ wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== '''cplic put''' <br>'''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> '''Remove license from database''' cplic db_rm <signature> [[category:license]] 6da82159454d9eb0bdb556fb6b97839876dd564a 795 794 2018-06-23T12:32:41Z Nighthawk 1 wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' cplic db_add < -l license-file | host expiration-date signature SKU/features > <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== '''cplic put''' '''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> '''Remove license from database''' cplic db_rm <signature> [[category:license]] a93520b416c39f992e34b73150654bf09f587e24 794 793 2018-06-23T12:31:30Z Nighthawk 1 wikitext text/x-wiki License Database/repository Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf ==Print licenses in database/repository== cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] ==add license to device or repository== '''cplic db_add''' <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. ==retrieve/sync repo with remote gateways== '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. ==add local or attach license remotely== '''cplic put''' '''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> '''Add license to database''' cplic db_add < -l license-file | host expiration-date signature SKU/features > '''Remove license from database''' cplic db_rm <signature> [[category:license]] 59e837f608775b8f2888d4d35a20ec3a9383980f 793 714 2018-06-23T12:28:44Z Nighthawk 1 wikitext text/x-wiki License Database Operations: taken from R77 CP_R77_CLI_ReferenceGuide.pdf '''Print licenses in database''' cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] '''cplic db_add''' <br>'''Description''' Used to add one or more licenses to the license repository on the Security Management server. When local license are added to the license repository, they are automatically attached to its intended Check Point gateway, '''central licenses need to undergo the attachment process(using cplic put)'''. '''cplic get''' <br>'''Description ''' The cplic get command retrieves all licenses from a Security Gateway (or from all Security Gateways) into the license repository on the Security Management Server. '''This command helps you to synchronize the repository with the Check Point Security Gateways'''. When the command is run, all local changes are updated. '''cplic put''' '''Description ''' Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the license repository is also updated. cplic put <object name> [-ip dynamic ip] [-F <output file>] -l <license-file> [<host>] [<expiration date>] [<signature>] [<SKU/feature> '''Add license to database''' cplic db_add < -l license-file | host expiration-date signature SKU/features > '''Remove license from database''' cplic db_rm <signature> [[category:license]] a5caa916b0266cb65c916d6494b84315873a2953 714 713 2018-02-02T15:41:49Z Nighthawk 1 wikitext text/x-wiki License Database Operations: cplic db_add ... cplic db_rm <signature> cplic db_print <object name | -all> ... '''Add license to database''' cplic db_add < -l license-file | host expiration-date signature SKU/features > '''Remove license from database''' cplic db_rm <signature> '''Print licenses in database''' cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] [[category:license]] 977eaa9606a0974f8b7f788f478bbbc2c756a9ca 713 2018-02-02T15:41:27Z Nighthawk 1 Created page with "License Database Operations: cplic db_add ... cplic db_rm <signature> cplic db_print <object name | -all> ... '''Add license to database''' cplic db_add < -l license-file..." wikitext text/x-wiki License Database Operations: cplic db_add ... cplic db_rm <signature> cplic db_print <object name | -all> ... '''Add license to database''' cplic db_add < -l license-file | host expiration-date signature SKU/features > '''Remove license from database''' cplic db_rm <signature> ''' Print licenses in database''' cplic db_print <object name | -all> [-n noheader] [-x print signatures] [-t type] [-a attached] [[category:license]] be12a8aac7459692fd372bf8476cad66c3811907 snmp 0 254 924 923 2024-07-08T20:56:55Z Nighthawk 1 wikitext text/x-wiki mib files location on check point device $CPDIR/lib/snmp/ ==mib descriptions and OID of interest== appliance model "svnApplianceProductName" "1.3.6.1.4.1.2620.1.6.16.7" get check point version "svnVersion" "1.3.6.1.4.1.2620.1.6.4.1" example: [Expert@chkpfw1:0]# '''snmpget -v2c -c public localhost 1.3.6.1.4.1.2620.1.6.4.1.0''' SNMPv2-SMI::enterprises.2620.1.6.4.1.0 = STRING: "R80.20" firewall connections $ '''snmptranslate -Tz -m CHECKPOINT-MIB | grep -i fwnumconn''' "fwNumConn" "1.3.6.1.4.1.2620.1.1.25.3" $ '''snmpget -v 2c -c public 10.0.0.254 1.3.6.1.4.1.2620.1.1.25.3.0''' SNMPv2-SMI::enterprises.2620.1.1.25.3.0 = Gauge32: 3310 [[category:snmp]] [[category:monitoring]] 6122ef03384c423ac6fa6d2df172d7568a315eaf 923 861 2024-07-08T20:53:59Z Nighthawk 1 wikitext text/x-wiki mib files location on check point device $CPDIR/lib/snmp/ ==mib descriptions and OID of interest== appliance model "svnApplianceProductName" "1.3.6.1.4.1.2620.1.6.16.7" get check point version "svnVersion" "1.3.6.1.4.1.2620.1.6.4.1" example: [Expert@chkpfw1:0]# '''snmpget -v2c -c public localhost 1.3.6.1.4.1.2620.1.6.4.1.0''' SNMPv2-SMI::enterprises.2620.1.6.4.1.0 = STRING: "R80.20" firewall connections $ '''snmptranslate -Tz -m CHECKPOINT-MIB | grep -i fwnumconn''' "fwNumConn" "1.3.6.1.4.1.2620.1.1.25.3" $ '''snmpget -v 2c -c public 10.0.0.254 1.3.6.1.4.1.2620.1.1.25.3.0''' SNMPv2-SMI::enterprises.2620.1.1.25.3.0 = Gauge32: 3310 [[category:snmp]] [[category:monitoring]] 36ab182791544afcea976fd471002e01adeaf4a8 861 839 2021-04-15T18:39:38Z Nighthawk 1 wikitext text/x-wiki mib files location on check point device $CPDIR/lib/snmp/ ==mib descriptions and OID of interest== appliance model "svnApplianceProductName" "1.3.6.1.4.1.2620.1.6.16.7" get check point version "svnVersion" "1.3.6.1.4.1.2620.1.6.4.1" example: [Expert@chkpfw1:0]# '''snmpget -v2c -c public localhost 1.3.6.1.4.1.2620.1.6.4.1.0''' SNMPv2-SMI::enterprises.2620.1.6.4.1.0 = STRING: "R80.20" [[category:snmp]] [[category:monitoring]] 0c0a90b9dd04488802971cac095340b11220be86 839 2020-06-19T16:55:32Z Nighthawk 1 Created page with "mib files location $CPDIR/lib/snmp/ translating to/from OIDs and mib descriptions $ snmptranslate -Tz | grep -i <description | OID> [[category:snmp]] [[category:monitoring]]" wikitext text/x-wiki mib files location $CPDIR/lib/snmp/ translating to/from OIDs and mib descriptions $ snmptranslate -Tz | grep -i <description | OID> [[category:snmp]] [[category:monitoring]] 6c9c2e32088961b65cb157dc9ee7a310094888c5 snmp-extend to run custom script 0 257 862 850 2021-04-21T02:31:00Z Nighthawk 1 wikitext text/x-wiki 1) Create a script/command that monitors something on your system and output the result to stdout. <br>example <br>script: /usr/local/bin/check_everything.sh <br>outputs either... <br>STATUS: OK - everything good <br>or <br>STATUS: NOT OK! 2) Create entry in the SNMP config to the monitor script: # vi /etc/snmp/userDefinedSettings.conf add a line... extend everything_status /bin/sh /usr/local/bin/check_everything.sh 3) restart snmpd from clish, run "set snmp agent off" then run "set snmp agent on" 4) test it with a walk $ snmpwalk -On -v2c -c mycomstring 192.168.1.1 NET-SNMP-EXTEND-MIB::nsExtendObjects .1.3.6.1.4.1.8072.1.3.2.1.0 = INTEGER: 1 .1.3.6.1.4.1.8072.1.3.2.2.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: /bin/sh .1.3.6.1.4.1.8072.1.3.2.2.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: /usr/local/bin/check_everything.sh .1.3.6.1.4.1.8072.1.3.2.2.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: .1.3.6.1.4.1.8072.1.3.2.2.1.5.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 5 .1.3.6.1.4.1.8072.1.3.2.2.1.6.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: exec(1) .1.3.6.1.4.1.8072.1.3.2.2.1.7.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: run-on-read(1) .1.3.6.1.4.1.8072.1.3.2.2.1.20.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: permanent(4) .1.3.6.1.4.1.8072.1.3.2.2.1.21.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: active(1) .1.3.6.1.4.1.8072.1.3.2.3.1.1.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good .1.3.6.1.4.1.8072.1.3.2.3.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good .1.3.6.1.4.1.8072.1.3.2.3.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 1 .1.3.6.1.4.1.8072.1.3.2.3.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 0 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1 = STRING: STATUS: OK - everything good with a get $ snmpget -v 2c -c mycomstring 192.168.1.1 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1 NET-SNMP-EXTEND-MIB::nsExtendOutLine."fwpolicy_status".1 = STRING: STATUS: OK - everything good 19e2e1a38ae50936d1953bf4cb21dfee1011029b 850 2021-02-24T12:42:42Z Nighthawk 1 Created page with "1) Create a script/command that monitors something on your system and output the result to stdout. <br>example <br>script: /usr/local/bin/check_everything.sh <br>outputs eit..." wikitext text/x-wiki 1) Create a script/command that monitors something on your system and output the result to stdout. <br>example <br>script: /usr/local/bin/check_everything.sh <br>outputs either... <br>STATUS: OK - everything good <br>or <br>STATUS: NOT OK! 2) Create entry in the SNMP config to monitor the script: # vi /etc/snmp/userDefinedSettings.conf add a line... extend everything_status /bin/sh /usr/local/bin/check_everything.sh 3) restart snmpd from clish, run "set snmp agent off" then run "set snmp agent on" 4) test it with a walk $ snmpwalk -On -v2c -c mycomstring 192.168.1.1 NET-SNMP-EXTEND-MIB::nsExtendObjects .1.3.6.1.4.1.8072.1.3.2.1.0 = INTEGER: 1 .1.3.6.1.4.1.8072.1.3.2.2.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: /bin/sh .1.3.6.1.4.1.8072.1.3.2.2.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: /usr/local/bin/check_everything.sh .1.3.6.1.4.1.8072.1.3.2.2.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: .1.3.6.1.4.1.8072.1.3.2.2.1.5.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 5 .1.3.6.1.4.1.8072.1.3.2.2.1.6.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: exec(1) .1.3.6.1.4.1.8072.1.3.2.2.1.7.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: run-on-read(1) .1.3.6.1.4.1.8072.1.3.2.2.1.20.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: permanent(4) .1.3.6.1.4.1.8072.1.3.2.2.1.21.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: active(1) .1.3.6.1.4.1.8072.1.3.2.3.1.1.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good .1.3.6.1.4.1.8072.1.3.2.3.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = STRING: STATUS: OK - everything good .1.3.6.1.4.1.8072.1.3.2.3.1.3.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 1 .1.3.6.1.4.1.8072.1.3.2.3.1.4.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115 = INTEGER: 0 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1 = STRING: STATUS: OK - everything good with a get $ snmpget -v 2c -c mycomstring 192.168.1.1 .1.3.6.1.4.1.8072.1.3.2.4.1.2.15.102.119.112.111.108.105.99.121.95.115.116.97.116.117.115.1 NET-SNMP-EXTEND-MIB::nsExtendOutLine."fwpolicy_status".1 = STRING: STATUS: OK - everything good 3a444ddcab18a345bdea5270405787cde3427902 ssh tunneling r80.x smartconsole GUI 0 247 828 2019-05-09T04:29:27Z Nighthawk 1 Created page with "==disclaimer== this is not a recommended or secure configuration for production systems! ==sshd_config== modify the line AllowTcpForwarding no to AllowTcpForwarding ye..." wikitext text/x-wiki ==disclaimer== this is not a recommended or secure configuration for production systems! ==sshd_config== modify the line AllowTcpForwarding no to AllowTcpForwarding yes and restart sshd /etc/init.d/sshd restart ==ssh tunnel commands== Main GUI connection - port 19009 # ssh -f -N -L <relay_host>:19009:<r80_mgmt_svr>:19009 username@<r80_mgmt_svr> CRL download - port 18264 # ssh -f -N -L <relay_host>:18264:<r80_mgmt_svr>:18264 username@<r80_mgmt_svr> ICA connection - port 18190 - needed for manipulating objects which have SIC attributes # ssh -f -N -L <relay_host>:18190:<r80_mgmt_svr>:18190 username@<r80_mgmt_svr> ==GUI connection== lauch the smartconsole and specify the <relay_host> ip or hostname as the destination 8545818d5326d57a69aafb60811faa2c69054975 ssl network extender on gentoo linux 0 161 579 556 2016-04-26T01:49:46Z Nighthawk 1 wikitext text/x-wiki This page describes how to get the ssl extender SNX client up and running on a linux box. This is alternative to running the Secure Remote or Mobile client on a winblows box to establih a client to gateway vpn. For configure the SSL Network Extender server, please see the VPN Administration Guide for you version of Check Point. == install a java runtime environment JRE == google it if ya need to... == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again. An alternative is to download it from the SSL gateway. After logging into your gateway via web browser, click on settings [[file:snx-1.png]] Then you will hopefully find a download link like this... [[file:snx-2.png]] == install SNX == run the install file. It put a binary in /usr/bin/snx for me. The SSL gateway will likely download and try to install it for you. You may see a screen like... [[file:snx-3]] Then provide your root password and it should install for you. == test run snx == Often you will receive a "failed to initialize" error message when trying to connect. If so, run it from CLI to see what error messages you get. $ snx snx: error while loading shared libraries: libstdc++.so.5: cannot open shared object file: No such file or directory gentoo $ sudo emerge -av --quiet sys-libs/libstdc++-v3 for debian or ubuntu, if you can find the package... $ dpkg -i libstdc++5_3.3.6-17ubuntu1_i386.deb when if works, you should be able to run it and it will give you a help message like.. $ snx failed to open file: /home/john/.snxrc Valid attributes are: - server SNX server to connet to - sslport The SNX SSL port (if not default) - username the user name - certificate certificate file to use - calist directory containing CA files - reauth enable automatic reauthentication. Valid values { yes, no } - debug enable debug output. Valid values { yes, 1-5 } - cipher encryption algorithm to use. Valid values { RC4 / 3DES } - proxy_name proxy hostname - proxy_port proxy port - proxy_user username for proxy authentication == connect to SSL gateway == Once connected you should see something like this... [[file:snx-4.png]] and see a tun interface on you box. So, your client linux kernel must support creating tun interfaces to. # ifconfig tunsnx /vol1/distfiles tunsnx: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500 inet 172.16.10.41 netmask 255.255.255.255 destination 172.16.10.40 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1551 bytes 135768 (132.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 Ready to use your vpn! == links == I found this very helpful... [http://www.linuxplanet.org/blogs/?cat=2475 Check Point SSL Network Extender] [[category:vpn]] 556 439 2015-03-11T16:37:58Z Nighthawk 1 /* test run snx */ wikitext text/x-wiki This page describes how to get the ssl extender SNX client up and running on a linux box. This is alternative to running the Secure Remote or Mobile client on a winblows box to establih a client to gateway vpn. For configure the SSL Network Extender server, please see the VPN Administration Guide for you version of Check Point. == install a java runtime environment JRE == google it if ya need to... == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again. An alternative is to download it from the SSL gateway. After logging into your gateway via web browser, click on settings [[file:snx-1.png]] Then you will hopefully find a download link like this... [[file:snx-2.png]] == install SNX == run the install file. It put a binary in /usr/bin/snx for me. The SSL gateway will likely download and try to install it for you. You may see a screen like... [[file:snx-3]] Then provide your root password and it should install for you. == test run snx == Often you will receive a "failed to initialize" error message when trying to connect. If so, run it from CLI to see what error messages you get. $ snx snx: error while loading shared libraries: libstdc++.so.5: cannot open shared object file: No such file or directory gentoo $ sudo emerge -av --quiet sys-libs/libstdc++-v3 for debian or ubuntu, if you can find the package... $ dpkg -i libstdc++5_3.3.6-17ubuntu1_i386.deb when if works, you should be able to run it and it will give you a help message like.. $ snx failed to open file: /home/john/.snxrc Valid attributes are: - server SNX server to connet to - sslport The SNX SSL port (if not default) - username the user name - certificate certificate file to use - calist directory containing CA files - reauth enable automatic reauthentication. Valid values { yes, no } - debug enable debug output. Valid values { yes, 1-5 } - cipher encryption algorithm to use. Valid values { RC4 / 3DES } - proxy_name proxy hostname - proxy_port proxy port - proxy_user username for proxy authentication == connect to SSL gateway == Once connected you should see something like this... [[file:snx-4]] and see a tun interface on you box. So, your client linux kernel must support creating tun interfaces to. # ifconfig tunsnx /vol1/distfiles tunsnx: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500 inet 172.16.10.41 netmask 255.255.255.255 destination 172.16.10.40 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1551 bytes 135768 (132.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 Ready to use your vpn! == links == I found this very helpful... [http://www.linuxplanet.org/blogs/?cat=2475 Check Point SSL Network Extender] [[category:vpn]] 439 438 2014-05-06T04:50:41Z Nighthawk 1 wikitext text/x-wiki This page describes how to get the ssl extender SNX client up and running on a linux box. This is alternative to running the Secure Remote or Mobile client on a winblows box to establih a client to gateway vpn. For configure the SSL Network Extender server, please see the VPN Administration Guide for you version of Check Point. == install a java runtime environment JRE == google it if ya need to... == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again. An alternative is to download it from the SSL gateway. After logging into your gateway via web browser, click on settings [[file:snx-1.png]] Then you will hopefully find a download link like this... [[file:snx-2.png]] == install SNX == run the install file. It put a binary in /usr/bin/snx for me. The SSL gateway will likely download and try to install it for you. You may see a screen like... [[file:snx-3]] Then provide your root password and it should install for you. == test run snx == Often you will receive a "failed to initialize" error message when trying to connect. If so, run it from CLI to see what error messages you get. $ snx ~/src/checkpoint snx: error while loading shared libraries: libstdc++.so.5: cannot open shared object file: No such file or directory gentoo $ sudo emerge -av --quiet sys-libs/libstdc++-v3 for debian or ubuntu, if you can find the package... $ dpkg -i libstdc++5_3.3.6-17ubuntu1_i386.deb when if works, you should be able to run it and it will give you a help message like.. $ snx failed to open file: /home/john/.snxrc Valid attributes are: - server SNX server to connet to - sslport The SNX SSL port (if not default) - username the user name - certificate certificate file to use - calist directory containing CA files - reauth enable automatic reauthentication. Valid values { yes, no } - debug enable debug output. Valid values { yes, 1-5 } - cipher encryption algorithm to use. Valid values { RC4 / 3DES } - proxy_name proxy hostname - proxy_port proxy port - proxy_user username for proxy authentication == connect to SSL gateway == Once connected you should see something like this... [[file:snx-4]] and see a tun interface on you box. So, your client linux kernel must support creating tun interfaces to. # ifconfig tunsnx /vol1/distfiles tunsnx: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500 inet 172.16.10.41 netmask 255.255.255.255 destination 172.16.10.40 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1551 bytes 135768 (132.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 Ready to use your vpn! == links == I found this very helpful... [http://www.linuxplanet.org/blogs/?cat=2475 Check Point SSL Network Extender] [[category:vpn]] 438 436 2014-05-06T04:43:02Z Nighthawk 1 wikitext text/x-wiki == install a java runtime environment JRE == == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again. An alternative is to download it from the SSL gateway. After logging into your gateway via web browser, click on settings [[file:snx-1.png]] Then you will hopefully find a download link like this... [[file:snx-2.png]] == install SNX == run the install file. It put a binary in /usr/bin/snx for me. The SSL gateway will likely download and try to install it for you. You may see a screen like... [[file:snx-3]] Then provide your root password and it should install for you. == test run snx == Often you will receive a "failed to initialize" error message when trying to connect. If so, run it from CLI to see what error messages you get. $ snx ~/src/checkpoint snx: error while loading shared libraries: libstdc++.so.5: cannot open shared object file: No such file or directory gentoo $ sudo emerge -av --quiet sys-libs/libstdc++-v3 for debian or ubuntu, if you can find the package... $ dpkg -i libstdc++5_3.3.6-17ubuntu1_i386.deb when if works, you should be able to run it and it will give you a help message like.. $ snx failed to open file: /home/john/.snxrc Valid attributes are: - server SNX server to connet to - sslport The SNX SSL port (if not default) - username the user name - certificate certificate file to use - calist directory containing CA files - reauth enable automatic reauthentication. Valid values { yes, no } - debug enable debug output. Valid values { yes, 1-5 } - cipher encryption algorithm to use. Valid values { RC4 / 3DES } - proxy_name proxy hostname - proxy_port proxy port - proxy_user username for proxy authentication == connect to SSL gateway == Once connected you should see something like this... [[file:snx-4]] and see a tun interface on you box. So, your client linux kernel must support creating tun interfaces to. # ifconfig tunsnx /vol1/distfiles tunsnx: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500 inet 172.16.10.41 netmask 255.255.255.255 destination 172.16.10.40 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1551 bytes 135768 (132.5 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 Ready to use your vpn! == links == I found this very helpful... [http://www.linuxplanet.org/blogs/?cat=2475 Check Point SSL Network Extender] [[category:vpn]] 436 2014-05-06T04:36:20Z Nighthawk 1 Created page with " == install a java runtime environment JRE == == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again..." wikitext text/x-wiki == install a java runtime environment JRE == == downloading snx == if you can find it on the support website, download it. I found it once, but had trouble finding it again. An alternative is to download it from the SSL gateway. After logging into your gateway via web browser, click on settings [[file:snx-1.png]] Then you will hopefully find a download link like this... [[file:snx-2.png]] == install SNX == run the install file. It put a binary in /usr/bin/snx for me. The SSL gateway will likely download and try to install it for you. You may see a screen like... [[file:snx-3]] Then provide your root password and it should install for you. == test run snx == Often you will receive a "failed to initialize" error message when trying to connect. If so, run it from CLI to see what error messages you get. $ snx ~/src/checkpoint snx: error while loading shared libraries: libstdc++.so.5: cannot open shared object file: No such file or directory gentoo $ sudo emerge -av --quiet sys-libs/libstdc++-v3 for debian or ubuntu, if you can find the package... $ dpkg -i libstdc++5_3.3.6-17ubuntu1_i386.deb when if works, you should be able to run it and it will give you a help message like.. $ snx failed to open file: /home/john/.snxrc Valid attributes are: - server SNX server to connet to - sslport The SNX SSL port (if not default) - username the user name - certificate certificate file to use - calist directory containing CA files - reauth enable automatic reauthentication. Valid values { yes, no } - debug enable debug output. Valid values { yes, 1-5 } - cipher encryption algorithm to use. Valid values { RC4 / 3DES } - proxy_name proxy hostname - proxy_port proxy port - proxy_user username for proxy authentication [[category:vpn]] uninstalling check point products 0 117 220 219 2013-09-13T06:48:22Z Nighthawk 1 /* list installed Check Point RPMs */ wikitext text/x-wiki == list installed Check Point RPMs == [Expert@chkpfw1]# '''rpm -qa |grep -i ^cp| sort''' CPbackup-1-620000044 CPinfo-10-00 CPportal-R75.40-00 CPshell-1-986000015 CPsplatIS-R75.40-00 CPsuite-R75.40-00 cp-release-540-R75.40 cpio-2.5-3cp == Uninstall in reverse order of dependencies == [Expert@chkpfw1]# '''rpm -e CPportal-R75.40-00''' There are no packages dependent on: Check Point Management Portal R75.40. ******************************************* IMPORTANT: You must REBOOT the machine !!!! ******************************************* <br> ***************************************************************** Check Point Management Portal R75.40 uninstall complete. ***************************************************************** <br> [Expert@chkpfw1]# '''rpm -e CPinfo-10-00''' There are no packages dependent on: Check Point CPinfo. <br> ************************************** Check Point CPinfo uninstall complete. ************************************** [Expert@chkpfw1]# '''rpm -e CPsuite-R75.40-00''' There are no packages dependent on: Check Point R75.40. ******************************* Stopping Check Point Processes. ******************************* <br> ***************************************************** IMPORTANT: You must REBOOT the machine !!!! ***************************************************** <br> ***************************************** Check Point R75.40 uninstall complete. ***************************************** == Re-install products with sysconfig == sysconfig Choose a configuration item ('e' to exit): ------------------------------------------------------------------ 1) Host name 7) DHCP Server Configuration 2) Domain name 8) DHCP Relay Configuration 3) Domain name servers 9) Export Setup 4) Time and Date 10) Products Installation 5) Network Connections 11) Products Configuration 6) Routing 12) Hardware Monitoring ------------------------------------------------------------------ Welcome sceen... hit N for Next license agreement... hit Y for Yes 1 (*) New Installation 2 ( ) Installation Using Imported Configuration ... you can figure it out from here 219 218 2013-09-13T06:48:06Z Nighthawk 1 /* Re-install products with sysconfig */ wikitext text/x-wiki == list installed Check Point RPMs == [Expert@chkpfw1]# '''rpm -qa |grep -i ^cp| sort''' CPbackup-1-620000044 CPinfo-10-00 CPportal-R75.40-00 CPshell-1-986000015 CPsplatIS-R75.40-00 CPsuite-R75.40-00 cp-release-540-R75.40 cpio-2.5-3cp == Uninstall in reverse order of dependencies == [Expert@chkpfw1]# '''rpm -e CPportal-R75.40-00''' There are no packages dependent on: Check Point Management Portal R75.40. ******************************************* IMPORTANT: You must REBOOT the machine !!!! ******************************************* <br> ***************************************************************** Check Point Management Portal R75.40 uninstall complete. ***************************************************************** <br> [Expert@chkpfw1]# '''rpm -e CPinfo-10-00''' There are no packages dependent on: Check Point CPinfo. <br> ************************************** Check Point CPinfo uninstall complete. ************************************** [Expert@chkpfw1]# '''rpm -e CPsuite-R75.40-00''' There are no packages dependent on: Check Point R75.40. ******************************* Stopping Check Point Processes. ******************************* <br> ***************************************************** IMPORTANT: You must REBOOT the machine !!!! ***************************************************** <br> ***************************************** Check Point R75.40 uninstall complete. ***************************************** == Re-install products with sysconfig == sysconfig Choose a configuration item ('e' to exit): ------------------------------------------------------------------ 1) Host name 7) DHCP Server Configuration 2) Domain name 8) DHCP Relay Configuration 3) Domain name servers 9) Export Setup 4) Time and Date 10) Products Installation 5) Network Connections 11) Products Configuration 6) Routing 12) Hardware Monitoring ------------------------------------------------------------------ Welcome sceen... hit N for Next license agreement... hit Y for Yes 1 (*) New Installation 2 ( ) Installation Using Imported Configuration ... you can figure it out from here 218 217 2013-09-13T06:47:16Z Nighthawk 1 wikitext text/x-wiki == list installed Check Point RPMs == [Expert@chkpfw1]# '''rpm -qa |grep -i ^cp| sort''' CPbackup-1-620000044 CPinfo-10-00 CPportal-R75.40-00 CPshell-1-986000015 CPsplatIS-R75.40-00 CPsuite-R75.40-00 cp-release-540-R75.40 cpio-2.5-3cp == Uninstall in reverse order of dependencies == [Expert@chkpfw1]# '''rpm -e CPportal-R75.40-00''' There are no packages dependent on: Check Point Management Portal R75.40. ******************************************* IMPORTANT: You must REBOOT the machine !!!! ******************************************* <br> ***************************************************************** Check Point Management Portal R75.40 uninstall complete. ***************************************************************** <br> [Expert@chkpfw1]# '''rpm -e CPinfo-10-00''' There are no packages dependent on: Check Point CPinfo. <br> ************************************** Check Point CPinfo uninstall complete. ************************************** [Expert@chkpfw1]# '''rpm -e CPsuite-R75.40-00''' There are no packages dependent on: Check Point R75.40. ******************************* Stopping Check Point Processes. ******************************* <br> ***************************************************** IMPORTANT: You must REBOOT the machine !!!! ***************************************************** <br> ***************************************** Check Point R75.40 uninstall complete. ***************************************** == Re-install products with sysconfig == sysconfig Choose a configuration item ('e' to exit): ------------------------------------------------------------------ 1) Host name 7) DHCP Server Configuration 2) Domain name 8) DHCP Relay Configuration 3) Domain name servers 9) Export Setup 4) Time and Date 10) Products Installation 5) Network Connections 11) Products Configuration 6) Routing 12) Hardware Monitoring ------------------------------------------------------------------ Welcome sceen... hit N for Next license agreement... hit Y for Yes 1 (*) New Installation 2 ( ) Installation Using Imported Configuration 217 2013-09-13T06:44:42Z Nighthawk 1 Created page with " == list installed Check Point RPMs == [Expert@chkpfw1]# '''rpm -qa |grep -i ^cp| sort''' CPbackup-1-620000044 CPinfo-10-00 CPportal-R75.40-00 CPshell-1-986000015 CPsplatIS..." wikitext text/x-wiki == list installed Check Point RPMs == [Expert@chkpfw1]# '''rpm -qa |grep -i ^cp| sort''' CPbackup-1-620000044 CPinfo-10-00 CPportal-R75.40-00 CPshell-1-986000015 CPsplatIS-R75.40-00 CPsuite-R75.40-00 cp-release-540-R75.40 cpio-2.5-3cp == Uninstall in reverse order of dependencies == [Expert@chkpfw1]# '''rpm -e CPportal-R75.40-00''' There are no packages dependent on: Check Point Management Portal R75.40. ******************************************* IMPORTANT: You must REBOOT the machine !!!! ******************************************* ***************************************************************** Check Point Management Portal R75.40 uninstall complete. ***************************************************************** [Expert@chkpfw1]# '''rpm -e CPinfo-10-00''' There are no packages dependent on: Check Point CPinfo. ************************************** Check Point CPinfo uninstall complete. ************************************** [Expert@chkpfw1]# '''rpm -e CPsuite-R75.40-00''' There are no packages dependent on: Check Point R75.40. ******************************* Stopping Check Point Processes. ******************************* ***************************************************** IMPORTANT: You must REBOOT the machine !!!! ***************************************************** ***************************************** Check Point R75.40 uninstall complete. ***************************************** == Re-install products with sysconfig == sysconfig Choose a configuration item ('e' to exit): ------------------------------------------------------------------ 1) Host name 7) DHCP Server Configuration 2) Domain name 8) DHCP Relay Configuration 3) Domain name servers 9) Export Setup 4) Time and Date 10) Products Installation 5) Network Connections 11) Products Configuration 6) Routing 12) Hardware Monitoring ------------------------------------------------------------------ Welcome sceen... hit N for Next license agreement... hit Y for Yes 1 (*) New Installation 2 ( ) Installation Using Imported Configuration verify gaia vrrp preempt mode 0 201 608 2016-11-14T20:20:31Z Nighthawk 1 Created page with "<src> [Expert@chkpfw1:0]# clish -c "show configuration" | grep preempt | awk '{print $(NF-1), $NF}' preempt-mode off </src>" wikitext text/x-wiki <src> [Expert@chkpfw1:0]# clish -c "show configuration" | grep preempt | awk '{print $(NF-1), $NF}' preempt-mode off </src> 49b193f2115f83dfa0fd5ef0c7ba9a0fa1dd84d1 viewing CoreXL statistics 0 103 198 187 2013-07-23T16:34:05Z Nighthawk 1 wikitext text/x-wiki The following command displays status of CoreXL instances and summary for traffic that passes through each instance (current number and peak number of concurrent connections # '''fw ctl multik stat''' ID | Active | CPU | Connections | Peak ------------------------------------------- 0 | Yes | 5 | 2250 | 6165 1 | Yes | 4 | 2952 | 4677 2 | Yes | 3 | 2813 | 4337 [Expert@chkpfw]# fw ctl affinity -l -v Kernel fw_0: CPU 5 Kernel fw_1: CPU 4 Kernel fw_2: CPU 3 [[category:corexl]] 187 186 2013-07-19T14:24:14Z Nighthawk 1 wikitext text/x-wiki The following command displays status of CoreXL instances and summary for traffic that passes through each instance (current number and peak number of concurrent connections # '''fw ctl multik stat''' [[category:corexl]] 186 2013-07-19T14:24:02Z Nighthawk 1 Created page with "The following command displays status of CoreXL instances and summary for traffic that passes through each instance (current number and peak number of concurrent connections ..." wikitext text/x-wiki The following command displays status of CoreXL instances and summary for traffic that passes through each instance (current number and peak number of concurrent connections # fw ctl multik stat [[category:corexl]] vmware nsx notes 0 250 834 833 2019-08-16T15:44:42Z Nighthawk 1 wikitext text/x-wiki =NSX-T= ==Tier-0 Gateways== A tier-0 gateway performs the functions of a tier-0 logical router. It processes traffic between the logical and physical networks. An Edge node can support only one tier-0 gateway or logical router. ==documentation== [https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html VMware NSX-T Data Center Documentation] [[category:vmware]] 12227960544056a98ab695c597fef1d57de12148 833 2019-08-16T13:43:43Z Nighthawk 1 Created page with "=NSX-T= ==Tier-0 Gateways== A tier-0 gateway performs the functions of a tier-0 logical router. It processes traffic between the logical and physical networks. An Edge node c..." wikitext text/x-wiki =NSX-T= ==Tier-0 Gateways== A tier-0 gateway performs the functions of a tier-0 logical router. It processes traffic between the logical and physical networks. An Edge node can support only one tier-0 gateway or logical router. 4db94234edf91a9cb5c91612a6ffdbe0272aaa2c vsx notes 0 270 922 921 2024-07-03T14:25:54Z Nighthawk 1 wikitext text/x-wiki ==performance optimization== concurrent connections sizing - automatic setting not available for VSX. this must be hard coded and monitored. ==troubleshooting== show status [Expert@MyVsxGW:2]# '''vsx stat -v''' VSX Gateway Status ================== Name: VSX1_192.168.3.241 Access Control Policy: VSX_Cluster_VSX Installed at: 20Sep2019 22:06:33 Threat Prevention Policy: <No Policy> SIC Status: Trust Number of Virtual Systems allowed by license: 25 Virtual Systems [active / configured]: 2 / 2 Virtual Routers and Switches [active / configured]: 0 / 0 Total connections [current / limit]: 5 / 44700 Virtual Devices Status ====================== ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat -----+-------------+-----------------------+-----------------+--------------------------+--------- 1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust 2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust set the context to the appropriate Virtual System with "vsenv <ID|name> # '''vsenv 2''' get interfaces # '''fw getifs''' 1621f51c15a6806fbf2db1dd24216936ae3998fb 921 920 2024-07-03T03:57:42Z Nighthawk 1 wikitext text/x-wiki ==troubleshooting== show status [Expert@MyVsxGW:2]# '''vsx stat -v''' VSX Gateway Status ================== Name: VSX1_192.168.3.241 Access Control Policy: VSX_Cluster_VSX Installed at: 20Sep2019 22:06:33 Threat Prevention Policy: <No Policy> SIC Status: Trust Number of Virtual Systems allowed by license: 25 Virtual Systems [active / configured]: 2 / 2 Virtual Routers and Switches [active / configured]: 0 / 0 Total connections [current / limit]: 5 / 44700 Virtual Devices Status ====================== ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat -----+-------------+-----------------------+-----------------+--------------------------+--------- 1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust 2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust set the context to the appropriate Virtual System with "vsenv <ID|name> # '''vsenv 2''' get interfaces # '''fw getifs''' ead9d6cec8eaf32d0cfecdd5b575d73f41b49cca 920 2024-07-03T03:50:29Z Nighthawk 1 Created page with " ==troubleshooting== show status [Expert@MyVsxGW:2]# '''vsx stat -v''' VSX Gateway Status ================== Name: VSX1_192.168.3.241 Access Control Policy: VSX_Clust..." wikitext text/x-wiki ==troubleshooting== show status [Expert@MyVsxGW:2]# '''vsx stat -v''' VSX Gateway Status ================== Name: VSX1_192.168.3.241 Access Control Policy: VSX_Cluster_VSX Installed at: 20Sep2019 22:06:33 Threat Prevention Policy: <No Policy> SIC Status: Trust Number of Virtual Systems allowed by license: 25 Virtual Systems [active / configured]: 2 / 2 Virtual Routers and Switches [active / configured]: 0 / 0 Total connections [current / limit]: 5 / 44700 Virtual Devices Status ====================== ID | Type & Name | Access Control Policy | Installed at | Threat Prevention Policy | SIC Stat -----+-------------+-----------------------+-----------------+--------------------------+--------- 1 | S VS1 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust 2 | S VS2 | VS_Policy | 20Sep2019 22:07 | <No Policy> | Trust 4fd104c3e3b154e2f75e0a1bd2f08f4cec712535 yum installation on secureplatform 0 107 576 312 2016-03-31T17:56:06Z Nighthawk 1 wikitext text/x-wiki ==versions== this guide was written for SPLAT, I think the version was... splat(75.40) glibc = glibc-2.3.2-95.34cp Gaia has a newer glibc and will need a different set of RPS from 5.1 centos (i think) to get the same objective done. gaia77.30 glibc = glibc-2.5-18.1.cp738000011 == Installing yum == Command log / list of my successful yum installation on SecurePlatform. It was truly an "rpm hell" experience to determine the required list of rpms and dependencies below. But, that is why I was installing yum... so that I only have to wade through RPM hell one time. If I ever do it again I can clean this command list up, change the order, and eliminate some of the errors. installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h 1>'''It works! localhost'''</h 1></body></html> ...yes I did! [[category:splat]] 312 311 2013-11-05T10:51:58Z Nighthawk 1 /* Installing yum */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform. It was truly an "rpm hell" experience to determine the required list of rpms and dependencies below. But, that is why I was installing yum... so that I only have to wade through RPM hell one time. If I ever do it again I can clean this command list up, change the order, and eliminate some of the errors. installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h 1>'''It works! localhost'''</h 1></body></html> ...yes I did! [[category:splat]] 311 310 2013-11-05T10:45:05Z Nighthawk 1 /* configuring yum */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform. If I ever do it again I can clean this command list up, change the order, and eliminate some of the errors. installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h 1>'''It works! localhost'''</h 1></body></html> ...yes I did! [[category:splat]] 310 309 2013-11-05T10:44:50Z Nighthawk 1 /* Installing yum */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform. If I ever do it again I can clean this command list up, change the order, and eliminate some of the errors. installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h 1>'''It works! localhost'''</h 1></body></html> ...yes I did! [[category:splat]] 309 308 2013-11-05T10:43:14Z Nighthawk 1 /* Installing software */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h 1>'''It works! localhost'''</h 1></body></html> ...yes I did! [[category:splat]] 308 307 2013-11-05T10:39:41Z Nighthawk 1 /* Installing software */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.1.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h1>'''It works! localhost'''</h1></body></html> ...yes I did! [[category:splat]] 307 306 2013-11-05T10:39:18Z Nighthawk 1 /* Installing software */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.175.100/index.html''' --05:42:43-- http://192.168.1.100/index.html => `index.html.1' Connecting to 192.168.1.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h1>'''It works! localhost'''</h1></body></html> ...yes I did! [[category:splat]] 306 305 2013-11-05T10:38:54Z Nighthawk 1 /* Installing software */ wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' lets start that apache up shall we? [Expert@ckkpmgr]# '''/etc/init.d/httpd start''' Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.175.100/index.html''' --05:42:43-- http://192.168.175.100/index.html => `index.html.1' Connecting to 192.168.175.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h1>'''It works! localhost'''</h1></body></html> ...yes I did! [[category:splat]] 305 303 2013-11-05T10:38:01Z Nighthawk 1 wikitext text/x-wiki == Installing yum == Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] == configuring yum == I don't have the specific details here. You can we search how to setup yum to work with a particular repository. Here is a link to an old one that is still online... [http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/ http://mirror.hmc.edu/centos/3.8/os/i386/RedHat/RPMS/] == Installing software == Here is my living proof I made yum work on splat... [Expert@ckkpmgr]# '''yum search httpd''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Looking in available packages for a providing package Available package: redhat-config-httpd.noarch 5:1.1.0-4.30.2 from base matches with redhat-config-httpd Available package: httpd-devel.i386 0:2.0.46-77.ent.centos from update matches with httpd-devel Available package: httpd.i386 0:2.0.46-77.ent.centos from update matches with httpd 3 results returned Looking in installed packages for a providing package No packages found [Expert@ckkpmgr]# '''yum install httpd.i386 0:2.0.46-77.ent.centos''' Gathering header information file(s) from server(s) Server: CentOS-3 - Addons Server: CentOS-3 - Base Server: CentOS-3 - Extras Server: CentOS-3 - Updates Finding updated packages Downloading needed headers Cannot find a package matching 0:2.0.46-77.ent.centos Resolving dependencies Dependencies resolved I will do the following: [install: httpd 2.0.46-77.ent.centos.i386] Is this ok [y/N]: y Downloading Packages Running test transaction: Test transaction complete, Success! httpd 100 % done 1/1 Installed: httpd 2.0.46-77.ent.centos.i386 '''Transaction(s) Complete''' [Expert@ckkpmgr]# /etc/init.d/httpd start Starting httpd: httpd: Could not determine the server's fully qualified domain name, using 192.168.1.100 for ServerName [ OK ] I can't believe it is running, let me check... [Expert@ckkpmgr]# '''netstat -anp | grep httpd''' tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 20186/httpd yep, it is really running [Expert@ckkpmgr]# '''wget http://192.168.175.100/index.html''' --05:42:43-- http://192.168.175.100/index.html => `index.html.1' Connecting to 192.168.175.100:80... connected. HTTP request sent, awaiting response... 200 OK Length: 55 [text/html] <br> 100%[========================================================================================>] 55 --.--K/s <br> 05:42:43 (11.01 MB/s) - `index.html.1' saved [55/55] did I just get a file from my Check Point http server? [Expert@ckkpmgr]# cat index.html <html><body><h1>'''It works! localhost'''</h1></body></html> ...yes I did! [[category:splat]] 303 195 2013-11-05T10:09:42Z Nighthawk 1 wikitext text/x-wiki Command log / list of my successful yum installation on SecurePlatform installed this library, from a centos 3.8 installation (I think) # scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ # rpm -ivh ./info-4.5-3.el3.1.i386.rpm # rpm -ivh ./readline-4.3-5.2.i386.rpm # rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm # file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp # rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm # rpm -ivh ./gmp-4.1.2-5.i386.rpm # rpm -ivh python-2.2.3-6.6.i386.rpm # rpm -ivh ./libxml2-2.5.10-7.i386.rpm # rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm # rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? # rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# '''rpm -ivh ./patch-2.5.4-16.i386.rpm''' warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh rpm*30*''' warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# '''rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm''' warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] [[category:splat]] 195 194 2013-07-22T19:52:19Z Nighthawk 1 wikitext text/x-wiki scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ rpm -ivh ./info-4.5-3.el3.1.i386.rpm rpm -ivh ./readline-4.3-5.2.i386.rpm rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm rpm -ivh ./gmp-4.1.2-5.i386.rpm rpm -ivh python-2.2.3-6.6.i386.rpm rpm -ivh ./libxml2-2.5.10-7.i386.rpm rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? rpm -ivh ./elfutils-0.94.1-2.i386.rpm warning: perl-5.8.0-94.EL3.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:perl ########################################### [100%] [Expert@ckkpmgr]# rpm -Uvh rpm*30* warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b error: Failed dependencies: patch >= 2.5 is needed by rpm-build-4.2.3-30_nonptl [Expert@ckkpmgr]# rpm -ivh ./patch-2.5.4-16.i386.rpm warning: ./patch-2.5.4-16.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:patch ########################################### [100%] [Expert@ckkpmgr]# rpm -Uvh rpm*30* warning: rpm-4.2.3-30_nonptl.i386.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:rpm-libs ########################################### [ 20%] 2:rpm ########################################### [ 40%] 3:rpm-build ########################################### [ 60%] 4:rpm-devel ########################################### [ 80%] 5:rpm-python ########################################### [100%] [Expert@ckkpmgr]# rpm -Uvh yum-2.0.8-2.centos3.noarch.rpm warning: yum-2.0.8-2.centos3.noarch.rpm: V3 DSA signature: NOKEY, key ID 025e513b Preparing... ########################################### [100%] 1:yum ########################################### [100%] 194 193 2013-07-22T19:11:22Z Nighthawk 1 wikitext text/x-wiki scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ rpm -ivh ./info-4.5-3.el3.1.i386.rpm rpm -ivh ./readline-4.3-5.2.i386.rpm rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm rpm -ivh ./gmp-4.1.2-5.i386.rpm rpm -ivh python-2.2.3-6.6.i386.rpm rpm -ivh ./libxml2-2.5.10-7.i386.rpm rpm -ivh ./libxml2-python-2.5.10-7.i386.rpm rpm -ivh --replacefiles ./elfutils-libelf-0.94.1-2.i386.rpm <<< should redo with -Uvh??? rpm -ivh ./elfutils-0.94.1-2.i386.rpm 193 2013-07-22T18:08:16Z Nighthawk 1 Created page with " scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ rpm -ivh ./info-4.5-3.el3.1.i386.rpm rpm -ivh ./readline-4.3-5.2.i386.rpm rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm ***..." wikitext text/x-wiki scp /lib/libssl.so.0.9.7a admin@192.168.175.100:/lib/ rpm -ivh ./info-4.5-3.el3.1.i386.rpm rpm -ivh ./readline-4.3-5.2.i386.rpm rpm -ivh ./krb5-libs-1.2.7-66.i386.rpm *** failed **** rpm -ivh ./openssl-0.9.7a-33.23.i686.rpm file /lib/libcrypto.so.0.9.7a from install of openssl-0.9.7a-33.23 conflicts with file from package openssl-libcrypto-0.9.7a-36cp rpm -ivh --replacefiles ./openssl-0.9.7a-33.23.i686.rpm rpm -ivh ./gmp-4.1.2-5.i386.rpm rpm -ivh python-2.2.3-6.6.i386.rpm User:Duh123 2 196 590 2016-06-17T03:14:18Z Nighthawk 1 Creating user page for new user. wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 User:Lasttry2 2 197 592 2016-07-07T19:37:23Z Nighthawk 1 Creating user page for new user. wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:12400 front.png 6 164 444 442 2014-05-10T22:05:11Z Nighthawk 1 uploaded a new version of &quot;[[File:12400 front.png]]&quot; wikitext text/x-wiki 442 2014-05-10T22:03:42Z Nighthawk 1 wikitext text/x-wiki File:61000 cmm diagram-desc.png 6 136 354 2014-03-08T05:28:53Z Nighthawk 1 wikitext text/x-wiki File:61000 front panel.png 6 133 349 2014-03-08T05:16:38Z Nighthawk 1 wikitext text/x-wiki File:61000 front panel description.png 6 135 352 2014-03-08T05:23:36Z Nighthawk 1 wikitext text/x-wiki File:61k global cmds.png 6 175 492 2014-06-06T20:51:37Z Nighthawk 1 wikitext text/x-wiki File:chkp mgmt ha sync error.png 6 74 105 2013-05-21T06:41:01Z Nighthawk 1 wikitext text/x-wiki File:chkp vrrp cluster config-1.png 6 122 248 2013-09-15T08:21:20Z Nighthawk 1 wikitext text/x-wiki File:chkp vrrp rule.png 6 121 231 2013-09-13T21:16:04Z Nighthawk 1 wikitext text/x-wiki File:cp mgmt api enable all IPs.png 6 230 745 2018-04-22T21:37:52Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:cpportsr77.png 6 229 718 2018-03-16T15:14:06Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:gateway view.png 6 235 763 762 2018-04-24T17:21:24Z Nighthawk 1 Nighthawk uploaded a new version of &quot;[[File:gateway view.png]]&quot; wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 762 2018-04-24T17:14:47Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:global assing.png 6 232 755 2018-04-24T15:28:56Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:install AND publish.png 6 239 779 2018-05-03T21:09:12Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:install select package.png 6 240 780 2018-05-03T21:11:40Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:install status.png 6 242 782 2018-05-03T21:31:22Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:log file open.png 6 243 784 783 2018-05-04T17:25:17Z Nighthawk 1 Nighthawk uploaded a new version of &quot;[[File:log file open.png]]&quot; wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 783 2018-05-04T15:51:34Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:log servers list.png 6 244 785 2018-05-04T17:34:55Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:mds login.png 6 233 778 756 2018-05-03T15:31:42Z Nighthawk 1 Nighthawk uploaded a new version of &quot;[[File:mds login.png]]&quot; wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 756 2018-04-24T15:29:33Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:multidomain view.png 6 234 759 757 2018-04-24T16:04:02Z Nighthawk 1 Nighthawk uploaded a new version of &quot;[[File:multidomain view.png]]&quot; wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 757 2018-04-24T15:29:44Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:object locked.png 6 237 770 2018-04-24T21:35:50Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:pan load migrated config nat rule errors.png 6 61 82 2013-04-26T17:49:11Z Nighthawk 1 pan load migrated config nat rule errors wikitext text/x-wiki pan load migrated config nat rule errors File:publish.png 6 241 781 2018-05-03T21:16:33Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:session disconnected.png 6 236 772 768 2018-04-24T21:41:37Z Nighthawk 1 Nighthawk uploaded a new version of &quot;[[File:session disconnected.png]]&quot; wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 768 2018-04-24T21:31:26Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:snx-1.png 6 158 433 2014-05-06T04:21:43Z Nighthawk 1 wikitext text/x-wiki File:snx-2.png 6 160 435 2014-05-06T04:22:56Z Nighthawk 1 wikitext text/x-wiki File:snx-4.png 6 162 437 2014-05-06T04:39:09Z Nighthawk 1 wikitext text/x-wiki File:unified and legacy consoles.png 6 238 775 2018-05-01T19:54:51Z Nighthawk 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:wine32 smartconsole install-bad.png 6 172 484 2014-05-26T20:44:20Z Nighthawk 1 wikitext text/x-wiki File:wine32 smartconsole install-ok.png 6 171 483 2014-05-26T20:43:31Z Nighthawk 1 wikitext text/x-wiki File:wine smartconsole install-winver.png 6 170 480 2014-05-26T20:39:29Z Nighthawk 1 wikitext text/x-wiki